• DIGITAL FORENSICS, MALWARE ANALYSIS, THREAT INTELLIGENCE
  • FOUNDATIONAL LEADERSHIP
  • INCIDENT RESPONSE & THREAT HUNTING




    Download 0.53 Mb.
    Pdf ko'rish
    bet3/6
    Sana05.03.2024
    Hajmi0.53 Mb.
    #166964
    1   2   3   4   5   6
    Bog'liq
    2023 Roadmap 02-23
    kamyob ses, oyin-tuzilmasi-pedagogik-oyinlar-klassifikatsiyasi (1), effective-contract-president, 4-amaliyot, Azzam Ismoilov- REPORT, Shoshib ketayotgan Ummulxayrdan so, Matnli axborotlarni qayta ishlash texnologiyasi-fayllar.org, reja pro, Kurs mazmuni Sayt oddel, cyber-security, black hat python, протокол, obrazec-akt-o-neispravnosti-oborudovaniya, 1476215012 65429
    INCIDENT RESPONSE & THREAT HUNTING | HOST & NETWORK FORENSICS
    Every Forensics and IR Professional Should Know
    ENDPOINT
    FORENSICS
    FOR500 Windows Forensic Analysis | GCFE
    FOR508 Advanced Incident Response, Threat Hunting,
    and Digital Forensics | GCFA
    FOR532 Enterprise Memory Forensics In-Depth
    FOR577: LINUX Incident Response & Analysis
    FOR608 Enterprise-Class Incident Response & Threat Hunting
    NETWORK 
    FORENSICS
    FOR572 Advanced Network Forensics: Threat Hunting,
    Analysis, and Incident Response | GNFA
    Whether you’re seeking to maintain a trail of evidence on host or network systems
    or hunting for threats using similar techniques, larger organizations need specialized 
    professionals who can move beyond first-response incident handling in order to 
    analyze an attack and develop an appropriate remediation and recovery plan.
    DIGITAL FORENSICS, MALWARE ANALYSIS,
    & THREAT INTELLIGENCE | SPECIALIZED INVESTIGATIVE SKILLS
    Specialization
    CLOUD FORENSICS
    FOR509 Enterprise Cloud Forensics & Incident Response | GCFR
    RANSOMWARE
    FOR528 Ransomware for Incident Responders
    MALWARE ANALYSIS
    FOR610 Reverse-Engineering Malware:
    Malware Analysis Tools and Techniques | GREM
    FOR710 Reverse-Engineering Malware: Advanced Code Analysis
    Threat Intelligence
    CYBER THREAT INTELLIGENCE FOR578 Cyber Threat Intelligence | GCTI
    FOR589 Cybercrime Intelligence
    Digital Forensics & Media Exploitation
    SMARTPHONES
    FOR585 Smartphone Forensic Analysis In-Depth | GASF
    MAC FORENSICS
    FOR518 Mac and iOS Forensic Analysis and 
    Incident Response | GIME
    FOUNDATIONAL LEADERSHIP
    Every Cybersecurity Manager Should Know
    CISSP® TRAINING
    MGT414 SANS Training Program for CISSP® Certification | GISP
    RISK 
    MANAGEMENT
    MGT415 A Practical Introduction to Cyber Security Risk Management
    SECURITY 
    AWARENESS
    MGT433 Managing Human Risk | SSAP
    With an increasing number of talented technologists, organizations require 
    effective leaders to manage their teams and processes. Those leaders will not 
    necessarily perform hands-on work, but they must know enough about the 
    underlying technologies and frameworks to help set strategy, develop appropriate 
    policies, interact with skilled practitioners, and measure outcomes.

    Download 0.53 Mb.
    1   2   3   4   5   6




    Download 0.53 Mb.
    Pdf ko'rish