Masterclass: Forensics and Incident Handling Training in Finland

  • Learn via: Virtual Classroom
  • Duration: 5 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity. In order to stay on top of the attackers, the knowledge of Individuals and Teams responsible for collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This is an intense hands-on course covering the general approach to forensics and incident handling, network forensics, important aspects of Windows internals, memory and storage analysis, detecting indicators of compromise and a proper way of reporting. 


Materials 

Author’s unique tools, virtual lab environment, hands-on exercises, presentation slides with notes. 

Examples of tools, software and examples used during the course 

• Belkasoft RAM Capturer 

• Wireshark 

• Volatility 

• The Sleuth Kit® (TSK) 

• Autopsy 

• DumpIt 

• DC3DD 

• Arsenal Image Mounter 

• Reclaim Me 

• ReFS Images 

• SysInternals Toolkit 

• ShadowCopyView 

• RegRipper 

• Rifiuti2 

• Registry Explorer/RECmd 

• FullEventLogView 

• EVTXtract 

• Loki IOC Scanner 

• Yara 

• LECmd 

• LinkParser 

• PECmd 

• SkypeLogViewer 

• SQLiteBrowser 

• NetWork Miner 

• StuxNet Memory Dump

IT professionals, Forensics and Incident Handling Specialists, Security Consultants, Enterprise Administrators, Infrastructure Architects, Security Professionals, Systems Engineers, Network Administrators and other people responsible for implementing network and perimeter security

Module 1: Introduction to Incident Handling 

1. Types and Examples of Cybersecurity Incidents 

2. Signs of an Incident 

3. Incident Prioritization 

4. Incident Response and Handling Steps 

5. Procedures and Preparation 


Module 2: Securing Monitoring Operations 

1. Industry Best Practices 

2. Detecting Malware via DNS logs 

3. Configuration Change Management 

4. Leveraging Proxy and Firewall Data 

5. Monitoring Critical Windows Events 

6. Detecting Malware via Windows Event Logs 


Module 3: Network Forensics and Monitoring 

1. Types and approaches to network monitoring 

2. Network evidence acquisition 

3. Network protocols and Logs 

4. LAB: Detecting Data Thievery 

5. LAB: Detecting WebShells 

6. Gathering data from network security appliances 

7. Detecting intrusion patterns and attack indicators 

8. Data correlation 

9. Hunting malware in network traffic 

10. Encoding and Encryption 


Module 4: Windows Internals 

1. Introduction to Windows Internals 

2. Fooling Windows Task Manager 

3. Processes and threads 

4. PID and TID 

5. Information gathering from the running operating system 

6. Obtaining Volatile Data 

7. A deep dive to Autoruns 

8. Effective permissions auditing 

9. PowerShell get NTFS permissions 

10. Obtaining permissions information with AccessChck 

11. Unnecessary and malicious services 

12. Detecting unnecessary services with PowerShell 


Module 5: Memory Dumping and Analysis 

1. Introduction to memory dumping and analysis 

2. Creating memory dump - Belkasoft RAM Capturer and DumpIt 

3. Utilizing Volatility to analyze Windows memory image 

4. Analyzing Stuxnet memory dump with Volatility 

5. Automatic memory analysis with Volatile 


Module 6: Indicators of compromise 

1. Yara rules language 

2. Malware detonation 

3. Introduction to reverse engineering 


Module 7: Storage Acquisition and Analysis 

1. Introduction to storage acquisition and analysis 

2. Drive Acquisition 

3. Mounting Forensic Disk Images 

4. Introduction to NTFS File System 

5. Windows File System Analysis 

6. Autopsy with other filesystems 

7. Building timelines Module 

8: Reporting – Digital Evidence This module covers the restrictions and important details about digital evidence gathering. Moreover, a proper structure of digital evidence report will be introduced. 



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Finland facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
02 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
08 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
15 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
25 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
12 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
12 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
15 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
17 syyskuuta 2024
Helsinki, Espoo
5 Days
Masterclass: Forensics and Incident Handling Training Course in Finland

Finland is a country located in northern Europe. Helsinki is the capital and largest city of the country. The majority of the people are Finns but there is also a small Lapp population in Lapland, where the country is famous for the Northern Lights. Finland's national languages are Finnish and Swedish.

Known for its vast forests, lakes, and natural beauty, Finland is one of the world's largest producers of forest products, such as paper, pulp, and lumber. One of the world's largest sea fortresses Suomenlinna, Rovaniemi with the "White Nights", dogsled safaris and of course the Northern Lights are what makes Finland so popular for tourists. Finland is one of the best places in the world to see the Northern Lights and attracts millions of tourists during its seasons.

Finland is home to a thriving technology industry and is widely recognized as one of the world's leading technology hubs. Companies such as Nokia and Rovio (creator of the popular game Angry Birds) are based in Finland. Some of the key factors that have contributed to Finland's success in technology include; strong investment in research and development, a highly educated workforce and fundings.

Finland has a strong educational system, and is widely regarded as one of the world's most literate countries. In fact, Finland's literacy rate is one of the highest in the world, and its students consistently perform well in international tests of math and reading ability.

Also, as a pioneer in environmental sustainability, Finland is known for its efforts to reduce its carbon footprint and promote clean energy. This Nordic country is also famous for its unique and distinctive cultural heritage, including its traditional folk music and its elaborate traditional costumes.

Helsinki, Finland's capital city, is the country's business center. Helsinki is Finland's largest city, and it is home to many of the country's major corporations and organizations, including many of the country's leading technology firms. The city is also a commercial, trade, and financial center, as well as one of the busiest ports in the Nordic region.

Take advantage of our diverse IT course offerings, spanning programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our knowledgeable instructors will provide you with practical training and industry insights, delivered directly to your chosen venue in Finland.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.