You'll make sense of how to perform dynamic and static examination on each and every critical record types, how to cut vindictive executables from files and how to see essential malware techniques. You'll similarly get some answers concerning gadgets and strategies for "run time" examination, investigating and disassembling harmful copies and framework traffic assessment.
Audience:
Instructor - Led Online Training Fee For Both Group Training & 1-on-1 Training 1650 | |
Group Training
19,20,21,22,23 Apr
09:00 AM - 05:00 PM CST
(8 Hours/Day)
03,04,05,06,07 May
09:00 AM - 05:00 PM CST
(8 Hours/Day)
07,08,09,10,11 Jun
09:00 AM - 05:00 PM CST
(8 Hours/Day)
GTR=Guaranteed to Run
|
|
|
|
Classroom training is available in select Cities
|
|
Special Solutions for Corporate Clients! Click here |
Hire Our Trainers! Click here |
· Have a PC framework that coordinates the expressed PC necessities; some product should be introduced before understudies come to class.
· Be acquainted with utilizing Windows and Linux working situations and have the option to investigate general OS availability and arrangement issues.
· Be acquainted with VMware and have the option to import and arrange virtual machines.
· Have a general thought regarding center programming ideas, for example, factors, circles, and capacities so as to rapidly get a handle on the applicable ideas here; in any case, no programming experience is vital.
After completion of this course; you will be able to:
· Assess the severity and repercussions of a situation that involves malicious software so recovery steps can be planned.
A knowledge on how to establish Indicators of Compromise and obtain other threat intelligence details for analyzing, scoping, and containing the incident.
No, the published fee includes all applicable taxes.
We offer below courses:
Certified Ethical Hacker V11 -CEH-v11 -
CompTIA-SY0-601-Security+ -
Computer Hacking Forensic Investigator (CHFI) V9 -
Certified Penetration Testing Professional - CPENT -
Certified Application Security Engineer .NET -
EC-Council Disaster Recovery Professional v3 -
Secure Code Review
Certified Chief Information Security Officer( CCISO ) -
Certified Threat Intelligence Analyst (CTIA) -