Through the user interactive labs the student will learn:
- The course will focus on the following tasks through several labs
- Manual Reviewing
- Automated Reviewing
- Answering IR, SOC, and TI objectives
Students will be provided with a program stub for each lab and then guided to create a project to meet the lab objectives.
Date & Time
(Online) Nov 16-17 8:30 AM – 5:00 PM CST
Who should attend?
- Individuals new to or desiring a better understanding of how to incorporate file intelligence into their Incident Response or SOC processes.
- Professionals who deal with technical issues but feel they do not have enough background in Reverse Engineering or Threat Intelligence.
- Technical professionals that need to be armed with greater knowledge of incident response, reverse engineering, threat intelligence and their role in resolving incidents.
Why this course?
- The course is designed for those with an interest in using dynamic techniques to interrogate and derive information from files. It conveys the necessary concepts, principles, and terms to lay down a solid foundation. If you have the requirement then it will serve your needs well.
- The course is a high beginner to low intermediate class to grow your professional reverse engineering skills.
- Laptop Required
- Requires basic knowledge of computers, technology, and command line interface (CLI)
- Assume students can open and operate browsers, find and use the comman line, execute scripts and open programs
- Requires knowledge of Linux
- Requires basic knowledge of Reverse Engineering and Network Traffic Protocols
- Understanding of virtual machines (VM) and how to use one.
- Assume studenst understand how to import and power on a VM
The following CDI courses are good follow-ups;
- Building a Secure Environment
- Practical Reverse Engineering
Chris Rogers has over two decades of direct experience with technology and security. Chris started off his career in DoD and continued that work with a number Fortune 50 companies. Chris has served in a diverse number of industry roles, including exploring experimental technologies, criminal forensics, intrusions, and investigations.
Certification of Completion