Masterclass: Forensics and Incident Handling Training in Germany

  • Learn via: Virtual Classroom
  • Duration: 5 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity. In order to stay on top of the attackers, the knowledge of Individuals and Teams responsible for collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This is an intense hands-on course covering the general approach to forensics and incident handling, network forensics, important aspects of Windows internals, memory and storage analysis, detecting indicators of compromise and a proper way of reporting. 


Materials 

Author’s unique tools, virtual lab environment, hands-on exercises, presentation slides with notes. 

Examples of tools, software and examples used during the course 

• Belkasoft RAM Capturer 

• Wireshark 

• Volatility 

• The Sleuth Kit® (TSK) 

• Autopsy 

• DumpIt 

• DC3DD 

• Arsenal Image Mounter 

• Reclaim Me 

• ReFS Images 

• SysInternals Toolkit 

• ShadowCopyView 

• RegRipper 

• Rifiuti2 

• Registry Explorer/RECmd 

• FullEventLogView 

• EVTXtract 

• Loki IOC Scanner 

• Yara 

• LECmd 

• LinkParser 

• PECmd 

• SkypeLogViewer 

• SQLiteBrowser 

• NetWork Miner 

• StuxNet Memory Dump

IT professionals, Forensics and Incident Handling Specialists, Security Consultants, Enterprise Administrators, Infrastructure Architects, Security Professionals, Systems Engineers, Network Administrators and other people responsible for implementing network and perimeter security

Module 1: Introduction to Incident Handling 

1. Types and Examples of Cybersecurity Incidents 

2. Signs of an Incident 

3. Incident Prioritization 

4. Incident Response and Handling Steps 

5. Procedures and Preparation 


Module 2: Securing Monitoring Operations 

1. Industry Best Practices 

2. Detecting Malware via DNS logs 

3. Configuration Change Management 

4. Leveraging Proxy and Firewall Data 

5. Monitoring Critical Windows Events 

6. Detecting Malware via Windows Event Logs 


Module 3: Network Forensics and Monitoring 

1. Types and approaches to network monitoring 

2. Network evidence acquisition 

3. Network protocols and Logs 

4. LAB: Detecting Data Thievery 

5. LAB: Detecting WebShells 

6. Gathering data from network security appliances 

7. Detecting intrusion patterns and attack indicators 

8. Data correlation 

9. Hunting malware in network traffic 

10. Encoding and Encryption 


Module 4: Windows Internals 

1. Introduction to Windows Internals 

2. Fooling Windows Task Manager 

3. Processes and threads 

4. PID and TID 

5. Information gathering from the running operating system 

6. Obtaining Volatile Data 

7. A deep dive to Autoruns 

8. Effective permissions auditing 

9. PowerShell get NTFS permissions 

10. Obtaining permissions information with AccessChck 

11. Unnecessary and malicious services 

12. Detecting unnecessary services with PowerShell 


Module 5: Memory Dumping and Analysis 

1. Introduction to memory dumping and analysis 

2. Creating memory dump - Belkasoft RAM Capturer and DumpIt 

3. Utilizing Volatility to analyze Windows memory image 

4. Analyzing Stuxnet memory dump with Volatility 

5. Automatic memory analysis with Volatile 


Module 6: Indicators of compromise 

1. Yara rules language 

2. Malware detonation 

3. Introduction to reverse engineering 


Module 7: Storage Acquisition and Analysis 

1. Introduction to storage acquisition and analysis 

2. Drive Acquisition 

3. Mounting Forensic Disk Images 

4. Introduction to NTFS File System 

5. Windows File System Analysis 

6. Autopsy with other filesystems 

7. Building timelines Module 

8: Reporting – Digital Evidence This module covers the restrictions and important details about digital evidence gathering. Moreover, a proper structure of digital evidence report will be introduced. 



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Germany facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
12 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
12 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
15 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
17 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
19 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
22 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
24 September 2024
Berlin, Hamburg, Münih
5 Days
Classroom / Virtual Classroom
25 September 2024
Berlin, Hamburg, Münih
5 Days
Masterclass: Forensics and Incident Handling Training Course in Germany

The Federal Republic of Germany is the second most populous country in Europe and is located in Central Europe. The official language of the country is German. Germany is one of the richest countries in the world. The main exports of the country include motor vehicles and iron and steel products.

Here are some fun facts about Germany:
The fairy tale writer, the Brothers Grimm, came from Germany and wrote many famous stories such as Cinderella, Snow White, and Sleeping Beauty.
Germany is home to the largest theme park in Europe, the Europa-Park.
The famous composer Ludwig van Beethoven was born in Germany.
The Autobahn, the German highway system, is known for having no general speed limit.


Berlin was divided by the Berlin Wall from 1961 to 1989. Known for its street art, Berlin has many colorful murals and graffiti throughout the city. Also, Berlin is home to many famous museums, such as the Pergamon Museum and the Museum Island. Many clubs and bars stay open until the early hours of the morning in this big city.

Another popular city is Munich, which is famous for its Oktoberfest beer festival that attracts millions of visitors every year. Munich is also home to many historic buildings, including Nymphenburg Palace and the Marienplatz town square.

The country's capital and largest city is Berlin, however Frankfurt is considered to be the business and financial center of Germany. It is home to the Frankfurt Stock Exchange, the European Central Bank, and many other financial institutions. Because of its central location within Europe and its status as a major financial hub, Frankfurt is often referred to as the "Mainhattan," a play on the city's name and its association with the Manhattan financial district in New York City.

Frankfurt is also a major transportation hub, with the largest airport in Germany and one of the largest in Europe, Frankfurt Airport. Additionally, it is a popular destination for tourists, with its historic city center, beautiful parks, and vibrant cultural scene.

Some of the top German technology companies like Siemens AG, Bosch, SAP SE, Deutsche Telekom, Daimler AG and Volkswagen has business centers in Frankfurt. The country has a strong tradition of engineering and innovation, and is home to many other world-class technology companies and research institutions.

Tailored to meet the specific needs of Germany, Bilginç IT Academy combines cutting-edge training methodologies with our comprehensive range of Certification Exam preparation courses and accredited corporate training programs. Experience a transformative approach to IT training that will redefine your expectations.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.