Recognize common methodologies for end-to-end attack chains (MITRE ATT&CKĀ® framework).
Conduct guided audits of compromised systems across multiple operating systems.
Use a SIEM to identify and assess an attack as it unfolds live.
Conduct guided audits of compromised systems across multiple operating systems.
Use a SIEM to identify and assess an attack as it unfolds live.
5 day course with lecture and hands-on labs.
Threat Hunters
Digital Forensics & Incident Response (DFIR) professionals
Recognize common methodologies for end-to-end attack chains (MITRE ATT&CKĀ® framework).
Conduct guided audits of compromised systems across multiple operating systems.
Use a SIEM to identify and assess an attack as it unfolds live.
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.