IT Security Centre Personnel, Auditors, CERT members, Network and System Administrators.
Basic knowledge of TCP/IP, networks, Linux and Windows operating system.
The following topics will be covered in order to conduct incident analysis without referring to storage components such as hard disks and RAM. Another objective is to detect incidents and malicious network traffic exploiting incorrect configuration of network components.
4 Days.
Attendees will be able to conduct computer analysis on their own.Attendees will be able to conduct network traffic analysis and to collect evidence without accessing storage components. They will also be able to detect malicious network traffic and security incidents deriving from components.
Course Tutor
After 10 years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 10 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit.
In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.
I have been consulting different compaines in security field which includes global banks such as ING Bank, HSBC, CitiBank and more.
In addition, I am an adjunct instructor in a university and teaching cyber security for years.
I involved in technical areas and has taken responsibilities in:
I’m creating my courses by using my know-how and 10 years of experience. As a result, our first course “Hacking Web Applications and Penetration Testing: Fast Start!” has gained “Best Seller” reputation in its category.
I have risen a lot of cyber security experts from scratch, and you are the next.