0345 4506120

Cyber Analyst Academy Investigator Pathway Bundle

Overview

Our hands-on Cyber Analyst Academy is a purposeful pathway for new security analysts, but also provides a platform for re-skilling existing IT teams.

 

The academy starts at a foundation level and accelerates at a pace designed to increase both knowledge and confidence of the individual at a sustainable rate.

 

We have designed this academy, so delegates can attend over any time period, so that it meets individual and organisational requirements. Whether that is over 10 weeks or 18 months. Delegates can also attend the entire academy or choose to join one or more of the three Cyber Analyst pathways: Foundation Pathway; Investigator Pathway; Responder Pathway.

 

The course package below is for the Investigator Pathway.

What's Included

The Investigator Pathway consists of 6 courses as follows:

 

Introduction to Digital Forensics - 3 Days

Introduction to digital forensics is designed to help commercial and government organizations collect, preserve and report on digital artefacts in a way which is suitable for use in investigations.
The course covers the broad topics essential to the digital forensics disciplines. It sets out a framework for investigations, covering the best practice as described by The National Police Chiefs' Council (NPCC) formally ACPO guidelines. Forensic fundamentals will be covered as well as the use of open source forensic tools. The data will be then analysed and an example report produced.


Open Source Intelligence Boot Camp - 5 Days

This Open Source Intelligence (OSINT) & Dark Web boot camp will provide delegates with skills to become efficient and effective at finding those key pieces of intelligence on the Internet and Dark Web. Dark Web allows criminals and human rights activists alike to avoid the people hunting them. There are a number of key technologies that have allowed The Dark Web to flourish, from cryptocurrency Bitcoin to software that allows anonymity such as Tor. The Dark Web is at the fore-front of criminal innovation and understanding how it works is the first step in being able to combat the illegal activities that go on there. This boot camp is highly practical allowing delegates the time to explore and understand some of the hundreds of tools and websites available.


Understanding and Managing the Threat of Malware – 3 Days

This 3-day workshop is designed to give delegates the technical ‘hands-on’ understanding and crucially analysing modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains many hands-on exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.

 

Introduction to Reverse Engineering Malware - 1 Day

This course is a one day introduction to reverse engineering malware in the Linux environment. Delegates will be guided through the entire process gaining new skills and experience reverse engineering malicious software with an insight in to the techniques used by malware to spread and infect other machines and devices and obfuscate their activity.

Delegates will gain hands on experience using decompilers, debuggers, network traffic analysis tools, hex editors and memory analysis tools.

This course is aimed at an introductory level to those wishing to learn both the basics and advanced techniques used to reverse engineer software. This course would be ideal for incident responders who want to take a more proactive role in analyzing identified threats.


Malicious Network Traffic Analysis - Threat Hunting - 1 Day

How do you know your organisation has already been compromised?

Most organisations are overwhelmed with alerts and lack visibility and the skills they need to detect and investigate advanced threats. The Threat Hunting course has been designed to test and teach those responsible for detecting and defending against advanced cyber-attacks. Learn to identify indicators, previously undetected vulnerabilities, suspicious insider or malicious activity on your network. Pinpoint advanced malware, zero-day vulnerabilities and lateral movement within your network. The cyber lab offers a safe environment for IT and security teams to develop their cyber defence skills and put to them to the test against the clock.

Learn where to look before, during and after an attack has taken place. Identify the presence of known and unknown vulnerabilities, compromises and threat actors. Discover tools and techniques to support rapid analysis of advanced cyber-attacks.

 

EC Council Computer Hacking Forensic Investigator (CHFI) Online

Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.

 

In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. Far too many cyber-attacks are occurring across the globe where laws are clearly broken and due to improper or non-existent forensic investigations, the cyber criminals go either unidentified, undetected, or are simply not prosecuted.

 

Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.

 

This product includes the relevant exam voucher and 6-months access to the EC-Council iLabs. Please note that the exam must be taken within this timeframe.

 

More Information

Learning Objectives

To increase the knowledge and confidence of the delegate.

Related Courses

Our Customers Include