We’ve been hit, how can CyberDefenses help? Incident Hotline

Cyber Defenses Academy

File Interrogation

$900.00

Clear

Product Description

Course Objectives

Through the user interactive labs the student will learn:

  • The course will focus on the following tasks through several labs
    • Manual Reviewing
    • Automated Reviewing
    • Answering IR, SOC, and TI objectives

Students will be provided with a program stub for each lab and then guided to create a project to meet the lab objectives.

Date & Time

(Online) Nov 16-17 8:30 AM – 5:00 PM CST

Location

Online

Target Student

Who should attend?

  • Individuals new to or desiring a better understanding of how to incorporate file intelligence into their Incident Response or SOC processes.
  • Professionals who deal with technical issues but feel they do not have enough background in Reverse Engineering or Threat Intelligence.
  • Technical professionals that need to be armed with greater knowledge of incident response, reverse engineering, threat intelligence and their role in resolving incidents.

Why this course?

  • The course is designed for those with an interest in using dynamic techniques to interrogate and derive information from files.  It conveys the necessary concepts, principles, and terms to lay down a solid foundation.  If you have the requirement then it will serve your needs well.
  • The course is a high beginner to low intermediate class to grow your professional reverse engineering skills.

Additional Information

  • Laptop Required
  • Requires basic knowledge of computers, technology, and command line interface (CLI)
    • Assume students can open and operate browsers, find and use the comman line, execute scripts and open programs
  • Requires knowledge of Linux
  • Requires basic knowledge of Reverse Engineering and Network Traffic Protocols
  • Understanding of virtual machines (VM) and how to use one.
    • Assume studenst understand how to import and power on a VM

What’s Next

The following CDI courses are good follow-ups;

  • Building a Secure Environment
  • Practical Reverse Engineering

Your Instructor

Chris Rogers

Chris Rogers has over two decades of direct experience with technology and security.  Chris started off his career in DoD and continued that work with a number Fortune 50 companies. Chris has served in a diverse number of industry roles, including exploring experimental technologies, criminal forensics, intrusions, and investigations.

Certification

Certification of Completion

Additional Information

File Interrogation is the next step in your reverse engineering path.  File Interrogation demonstrates the  power of what can be done to derive information from a file short of complete disassembly and debugging.

The course will focus on the following tasks through several labs:

  • Manual Reviewing
  • Automated Reviewing
  • Answering IR, SOC and TI objectives

Students will be provided with a program stub for each lab and then guided to create a project to meet the lab objectives.

Need help figuring out which cyber security solution is optimal for your company?