|
INCIDENT RESPONSE & THREAT HUNTINGBog'liq 2023 Roadmap 02-23 kamyob ses, oyin-tuzilmasi-pedagogik-oyinlar-klassifikatsiyasi (1), effective-contract-president, 4-amaliyot, Azzam Ismoilov- REPORT, Shoshib ketayotgan Ummulxayrdan so, Matnli axborotlarni qayta ishlash texnologiyasi-fayllar.org, reja pro, Kurs mazmuni Sayt oddel, cyber-security, black hat python, протокол, obrazec-akt-o-neispravnosti-oborudovaniya, 1476215012 65429INCIDENT RESPONSE & THREAT HUNTING | HOST & NETWORK FORENSICS
Every Forensics and IR Professional Should Know
ENDPOINT
FORENSICS
FOR500 Windows Forensic Analysis | GCFE
FOR508 Advanced Incident Response, Threat Hunting,
and Digital Forensics | GCFA
FOR532 Enterprise Memory Forensics In-Depth
FOR577: LINUX Incident Response & Analysis
FOR608 Enterprise-Class Incident Response & Threat Hunting
NETWORK
FORENSICS
FOR572 Advanced Network Forensics: Threat Hunting,
Analysis, and Incident Response | GNFA
Whether you’re seeking to maintain a trail of evidence on host or network systems,
or hunting for threats using similar techniques, larger organizations need specialized
professionals who can move beyond first-response incident handling in order to
analyze an attack and develop an appropriate remediation and recovery plan.
DIGITAL FORENSICS, MALWARE ANALYSIS,
& THREAT INTELLIGENCE | SPECIALIZED INVESTIGATIVE SKILLS
Specialization
CLOUD FORENSICS
FOR509 Enterprise Cloud Forensics & Incident Response | GCFR
RANSOMWARE
FOR528 Ransomware for Incident Responders
MALWARE ANALYSIS
FOR610 Reverse-Engineering Malware:
Malware Analysis Tools and Techniques | GREM
FOR710 Reverse-Engineering Malware: Advanced Code Analysis
Threat Intelligence
CYBER THREAT INTELLIGENCE FOR578 Cyber Threat Intelligence | GCTI
FOR589 Cybercrime Intelligence
Digital Forensics & Media Exploitation
SMARTPHONES
FOR585 Smartphone Forensic Analysis In-Depth | GASF
MAC FORENSICS
FOR518 Mac and iOS Forensic Analysis and
Incident Response | GIME
FOUNDATIONAL LEADERSHIP
Every Cybersecurity Manager Should Know
CISSP® TRAINING
MGT414 SANS Training Program for CISSP® Certification | GISP
RISK
MANAGEMENT
MGT415 A Practical Introduction to Cyber Security Risk Management
SECURITY
AWARENESS
MGT433 Managing Human Risk | SSAP
With an increasing number of talented technologists, organizations require
effective leaders to manage their teams and processes. Those leaders will not
necessarily perform hands-on work, but they must know enough about the
underlying technologies and frameworks to help set strategy, develop appropriate
policies, interact with skilled practitioners, and measure outcomes.
|
| |