The Computer Forensics :Incident Handling and Response course course is designed to help digital investigators and CERT teams identify malware on a computer system, pull malware apart to uncover its functionality and purpose, and determine the havoc malware wreaked on a subject system.Practical case scenarios are used throughout the course to demonstrate techniques and associated tools.
Furthermore, to bring malware analysis into the realm of forensic discipline, this course provides methodologies and discusses legal considerations that will enable digital investigators to perform their work in a reliable, repeatable, defensible, and thoroughly documented manner.
- Collecting Volatile Data
- Examination of memory
- Registry Analysis
- Static analysis of malware
- Dynamic analysis of malware
- Legal Considerations and Reporting
A laptop is a compulsory requirement due to the practical labs in the course. The laptop should have at least the specifications listed below:-
For more information about our training courses, contact us.
Africa Headquarters: Nairobi, Kenya.; Tel: + 254 518 007 755; Safaricom: + 254 722 102 854; Airtel: + 254 786 629 775; Fax: + 254 202 149 857; Email: firstname.lastname@example.org