0345 4506120

Security Operations Centre Analyst Programme Investigator Bundle

Overview

This hands-on SOC Analyst Programme is a purposeful pathway for new Security Analysts, but also provides a platform for re-skilling existing IT teams. The typical ten week programme starts at a foundation level and accelerates at a pace designed to increase both knowledge and confidence of the individual at a sustainable rate. Delegates can attend the entire programme or choose to join one or more of the three SOC Analyst Programme modules - Foundation, Investigator and Responder.

The course package below is for the Investigator programme.

What's Included

The Investigator Programme consists of 5 courses as follows:

Introduction to Digital Forensics - 3 Days

Introduction to digital forensics is designed to help commercial and government organizations collect, preserve and report on digital artefacts in a way which is suitable for use in investigations.
The course covers the broad topics essential to the digital forensics disciplines. It sets out a framework for investigations, covering the best practice as described by The National Police Chiefs' Council (NPCC) formally ACPO guidelines. Forensic fundamentals will be covered as well as the use of open source forensic tools. The data will be then analysed and an example report produced.


Open Source Intelligence Boot Camp - 5 Days

This Open Source Intelligence (OSINT) & Dark Web boot camp will provide delegates with skills to become efficient and effective at finding those key pieces of intelligence on the Internet and Dark Web. Dark Web allows criminals and human rights activists alike to avoid the people hunting them. There are a number of key technologies that have allowed The Dark Web to flourish, from cryptocurrency Bitcoin to software that allows anonymity such as Tor. The Dark Web is at the fore-front of criminal innovation and understanding how it works is the first step in being able to combat the illegal activities that go on there. This boot camp is highly practical allowing delegates the time to explore and understand some of the hundreds of tools and websites available.


Understanding and Managing the Threat of Malware – 3 Days

This 3-day workshop is designed to give delegates the technical ‘hands-on’ understanding and crucially analysing modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains many hands-on exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.


Introduction to Reverse Engineering Malware - 1 Day

This course is a one day introduction to reverse engineering malware in the Linux environment. Delegates will be guided through the entire process gaining new skills and experience reverse engineering malicious software with an insight in to the techniques used by malware to spread and infect other machines and devices and obfuscate their activity.

Delegates will gain hands on experience using decompilers, debuggers, network traffic analysis tools, hex editors and memory analysis tools.

This course is aimed at an introductory level to those wishing to learn both the basics and advanced techniques used to reverse engineer software. This course would be ideal for incident responders who want to take a more proactive role in analyzing identified threats.


Threat Hunting (CTF Programme Assessment) - 1 Day

How do you know your organisation has already been compromised?

Most organisations are overwhelmed with alerts and lack visibility and the skills they need to detect and investigate advanced threats. The Threat Hunting course has been designed to test and teach those responsible for detecting and defending against advanced cyber-attacks. Learn to identify indicators, previously undetected vulnerabilities, suspicious insider or malicious activity on your network. Pinpoint advanced malware, zero-day vulnerabilities and lateral movement within your network. The cyber lab offers a safe environment for IT and security teams to develop their cyber defence skills and put to them to the test against the clock.

Learn where to look before, during and after an attack has taken place. Identify the presence of known and unknown vulnerabilities, compromises and threat actors. Discover tools and techniques to support rapid analysis of advanced cyber-attacks.

More Information

Learning Objectives

To increase the knowledge and confidence of the delegate.

Related Courses

Our Customers Include