SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Training 2015 - Cyber Breach Management"

Difference between revisions of "Training 2015 - Cyber Breach Management"

From BruCON 2017

Jump to: navigation, search
(Created page with "=Cyber Breach Management= ===Course Description=== The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach...")
(No difference)

Revision as of 20:47, 28 April 2015

Cyber Breach Management

Course Description

The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach students how to successfully manage the people, processes, and voluminous data required to successfully investigate and recover from a breach. All phases of the incident response process will be covered and hands-on exercises will provide tools for analyzing system artifacts as well as scrutinizing and communicating technical findings.

Course Contents

To be specified

Student requirements

The class is geared toward students with a background in digital forensics, computer networking or systems administration. Students should be familiar with common computing and networking terms and concepts such as file systems, RAM, DNS, active directory, IP addresses, firewalls, etc. Comfort with the Windows and Linux command line would also be beneficial.

Trainer Biography

Russ Gideon.png

Chris Nutt is an expert in the field of incident response and digital forensics. He has more than 10 years of experience helping global organizations manage and conduct complex investigations into attacks targeting intellectual property and financial information.

He is a recent addition to Kroll’s Cyber Security practice, but spent the prior seven years with Mandiant, where he helped develop their investigative methodologies, digital forensics techniques, and technologies.

Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia. He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.

More information is available on carnal0wnage


300px-twitter-icon.jpg @attackresearch

Links :


Mon. 5 - 7 October 2015 (09:00 - 17:00)

Register.jpg

Back to Training Overview