Digital Investigations - Advanced Training Course
Course Outline
Upon completion of this course, you will be able to demonstrate knowledge and understanding of:
- The Forensic Investigation Process for government
- Utilizing Guidance Encase and FTK Access Data for government
- Cryptography, Steganography, and Media Files Forensic Techniques for government
- Password Cracking for government
- Investigating Wireless Attacks for government
- Investigating Web Application Attacks for government
- Investigating Web Server Attacks for government
- Investigating Database Server Attacks for government
- Investigating Email Crimes for government
- Investigating Mobile Application Crimes for government
Requirements
Runs with a minimum of 4 + people. For 1-to-1 or private group training, request a quote.
Digital Investigations - Advanced Training Course - Booking
Digital Investigations - Advanced Training Course - Enquiry
Digital Investigations - Advanced - Consultancy Enquiry
Consultancy Enquiry
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursCyber Defence (SOC) Analyst Foundation
7 HoursCHFI - Certified Digital Forensics Examiner
35 HoursMastering Continuous Threat Exposure Management (CTEM)
28 HoursCyber Emergency Response Team (CERT)
7 HoursCyber Threat Intelligence
35 HoursFundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in US (online or onsite) for government covers the various aspects of enterprise security, ranging from artificial intelligence to database protection. The course also includes an overview of the latest tools, processes, and strategies necessary to defend against cyber threats.
Ethical Hacker
35 HoursCertified Lead Ethical Hacker
35 HoursWhy Should You Attend?
The Certified Lead Ethical Hacker training course equips you with the essential expertise to conduct information system penetration tests by applying recognized principles, procedures, and techniques. This course will help you identify potential threats on computer networks and manage a penetration testing project or team effectively. During the training, you will learn how to plan and perform both internal and external penetration tests in compliance with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of drafting reports and proposing countermeasures. Through practical exercises, you will master penetration testing techniques and develop skills in managing a pentest team, customer communication, and conflict resolution.
This training provides a technical overview of information security through ethical hacking, using common methods like information gathering and vulnerability detection within and outside business networks. The course is aligned with the NICE (National Initiative for Cybersecurity Education) Protect and Defend framework, ensuring that it meets industry standards and best practices.
After acquiring the necessary knowledge and skills in ethical hacking, you can take the exam to earn the "PECB Certified Lead Ethical Hacker" credential. Holding this certificate demonstrates your proficiency in performing and managing penetration tests according to established best practices, which is crucial for government and private sector roles alike.
Who Should Attend?
- Individuals interested in IT security and ethical hacking, whether to deepen their knowledge or explore a career change.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers and consultants who want to learn how to oversee the penetration testing process effectively.
- Auditors aiming to conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems in an organization.
- Technical experts looking to prepare for and execute pentests.
- Cybersecurity professionals and members of information security teams who need advanced skills for their roles.
Understanding and Managing the Threat of Malware
7 HoursMalware Analysis (PCAP)
35 HoursFormat of the Course
- Interactive lecture and discussion sessions.
- Comprehensive exercises and practical activities.
- Hands-on implementation in a live-lab environment.
Course Customization Options for Government
- To request a customized training program tailored to specific agency needs, please contact us to arrange.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker (CEH) certification is highly sought after in the field of cybersecurity, both domestically and internationally.
This program includes comprehensive instruction and practical exercises designed to prepare students for the CEH certification exam and the CEH Practical Exam. Successfully passing both exams confers the CEH Master credential along with the CEH certification.
Students have the option to add either the CPENT or the CHFI course to their training package.
The Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course will be provided to each student through EC-Council’s online, self-paced, streaming video program for government use.
CPENT (Pen-test):
This course teaches students how to apply the concepts and tools covered in the CEH program to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
This course provides a methodological approach to computer forensics, including techniques for searching and seizing digital evidence, maintaining chain-of-custody, acquiring, preserving, analyzing, and reporting on digital evidence.
Course Description
The CEH program offers an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will equip you with the knowledge to understand how hackers think and operate maliciously, thereby enabling you to better secure your organization’s infrastructure and defend against future attacks. An awareness of system weaknesses and vulnerabilities helps organizations enhance their security controls and minimize the risk of incidents.
The CEH curriculum is designed to provide a hands-on environment and systematic process across each ethical hacking domain and methodology, giving students the opportunity to demonstrate the knowledge and skills necessary to earn the CEH credential. You will gain a new perspective on the responsibilities and measures required to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. The CEH Practical Exam is designed to assess students' ability to apply the principles taught in the CEH course. This practical exam requires you to demonstrate ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not include simulations; instead, it involves challenging a live range that mimics a corporate network using live virtual machines, networks, and applications. Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical will earn you the additional certification of CEH Master.
About the Certified Ethical Hacker Practical
To demonstrate your proficiency in ethical hacking, we assess your abilities through real-world challenges in a realistic environment. This involves using labs and tools to complete specific ethical hacking tasks within a time limit, mirroring real-world scenarios.
The EC-Council CEH (Practical) exam features a complex network that simulates a large organization’s real-life network infrastructure, including various systems such as DMZs and firewalls. You must apply your ethical hacking skills to discover and exploit live vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing in an enterprise network environment that requires attack, exploitation, evasion, and defense. If you have experience working only in flat networks, CPENT’s live practice range will elevate your skills by teaching you to test IoT systems, OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course provides a vendor-neutral perspective on digital forensics. This comprehensive program covers major forensic investigation scenarios and equips students with hands-on experience in various forensic techniques and standard forensic tools necessary for conducting successful computer forensic investigations.
MITRE ATT&CK
7 HoursSC-200T00: Microsoft Security Operations Analyst
28 HoursLearn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. This course is designed to help you mitigate cyberthreats using these technologies, specifically by configuring and utilizing Azure Sentinel and Kusto Query Language (KQL) for detection, analysis, and reporting. It is tailored for individuals in Security Operations roles and helps prepare learners for the exam SC-200: Microsoft Security Operations Analyst.
Audience Profile
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for government and private organizations. Their primary goal is to reduce risk by rapidly remediating active attacks, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. Responsibilities include threat management, monitoring, and response using a variety of security solutions across the environment. The role primarily involves investigating, responding to, and hunting for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. As these tools are critical for operational output, Security Operations Analysts are also key stakeholders in their configuration and deployment.
Job Role: Security Engineer
Preparation for Exam: SC-200
Features: None
Skills Gained
- Explain how Microsoft Defender for Endpoint can mitigate risks in your environment
- Create a Microsoft Defender for Endpoint environment
- Configure Attack Surface Reduction rules on Windows 10 devices
- Perform actions on a device using Microsoft Defender for Endpoint
- Investigate domains and IP addresses in Microsoft Defender for Endpoint
- Investigate user accounts in Microsoft Defender for Endpoint
- Configure alert settings in Microsoft Defender for Endpoint
- Explain the evolving threat landscape
- Conduct advanced hunting in Microsoft 365 Defender
- Manage incidents in Microsoft 365 Defender
- Explain how Microsoft Defender for Identity can mitigate risks in your environment
- Investigate DLP alerts in Microsoft Cloud App Security
- Explain the types of actions you can take on an insider risk management case
- Configure auto-provisioning in Azure Defender
- Remediate alerts in Azure Defender
- Construct KQL statements
- Filter searches based on event time, severity, domain, and other relevant data using KQL
- Extract data from unstructured string fields using KQL
- Manage an Azure Sentinel workspace
- Use KQL to access the watchlist in Azure Sentinel
- Manage threat indicators in Azure Sentinel
- Explain the differences between Common Event Format and Syslog connectors in Azure Sentinel
- Connect Azure Windows Virtual Machines to Azure Sentinel
- Configure Log Analytics agent to collect Sysmon events
- Create new analytics rules and queries using the analytics rule wizard
- Create a playbook to automate incident response
- Use queries to hunt for threats
- Observe threats over time with livestream