Digital Forensics Following Cyberattacks: What You Must Know And Do

Cybersecurity consultant Art Taryan will help you thoughtfully prepare for the inevitable. You will learn how to be ready when hackers strike your organization.

Topics covered

  • MITRE ATT&CK framework
  • Typical hacker techniques and tools
  • Incident response process
  • Incident management best practices
  • Live Windows examination
  • Network investigations
  • Memory investigations
  • Malware investigations
Skip to product information
1 of 1
On-Demand
Option
Regular price $224.00
Regular price Sale price $224.00
Sale Unavailable
View full details
INFORMATION
Training Overview

Learn how to analyze digital forensics after an attack. Be prepared as an engineer or IT to handle these issues.

A February Wired magazine article proclaimed, “In 2022, cyber incidents will cause real and sustained disruption to our everyday comforts—and maybe kill people. This won’t be because of any great geopolitical development, but because a bunch of semi-sophisticated, well-organized…criminals are increasingly out of control.”

You need to know how to respond to a successful cyberattack on your organization before confusion and fear take over. To interface with the incident response and digital forensics analysts who quickly spring into action during a crisis, you must understand how they verify, contain, and eradicate a threat.

It is helpful for you to have advance insight into the following cybersecurity areas:

  • MITRE ATT&CK framework
  • Typical hacker techniques and tools
  • Incident response process
  • Incident management best practices
  • Live Windows examination
  • Network investigations
  • Memory investigations
  • Malware investigations
Recommended Audience
Who Should Attend?
  • Financial institution personnel
  • Executives
  • Operations managers
  • Electronic banking managers
  • Information security officers
  • Risk management staff
  • Business leaders
  • Corporate executives
  • Information security officers
  • Information technology personnel
  • Public relations managers
  • Small business owners
  • Higher education administrators
  • Presidents
  • Chancellors
  • Provosts
  • Vice presidents for administration
  • Information security team members
  • School leaders
  • Superintendents
  • Deputy, associate, and assistant superintendents
  • Principals and heads of private schools
  • Directors of technology
  • Public information officers
  • School board members
What's included
Training includes
  • Certificate of Attendance
  • All resources and training materials
About

Expert Presenter

Art Taryan
  • 14 years of experience in risk/threat and project management within multiple Fortune 500 companies and the US military
  • Focuses on cyber threat intelligence, threat modeling, insider threat, incident response, and counter fraud
  • Leads the threat intelligence efforts within Cross Country Consulting’s Cyber; Privacy group
  • Previously an Army officer, including supporting real-world defensive and offensive cyber operations alongside the NSA