Masterclass: Forensics and Incident Handling Training in United States of America

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 5 Days
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK Based Global Training Provider

Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity. In order to stay on top of the attackers, the knowledge of Individuals and Teams responsible for collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This is an intense hands-on course covering the general approach to forensics and incident handling, network forensics, important aspects of Windows internals, memory and storage analysis, detecting indicators of compromise and a proper way of reporting. 


Materials 

Author’s unique tools, virtual lab environment, hands-on exercises, presentation slides with notes. 

Examples of tools, software and examples used during the course 

• Belkasoft RAM Capturer 

• Wireshark 

• Volatility 

• The Sleuth Kit® (TSK) 

• Autopsy 

• DumpIt 

• DC3DD 

• Arsenal Image Mounter 

• Reclaim Me 

• ReFS Images 

• SysInternals Toolkit 

• ShadowCopyView 

• RegRipper 

• Rifiuti2 

• Registry Explorer/RECmd 

• FullEventLogView 

• EVTXtract 

• Loki IOC Scanner 

• Yara 

• LECmd 

• LinkParser 

• PECmd 

• SkypeLogViewer 

• SQLiteBrowser 

• NetWork Miner 

• StuxNet Memory Dump

We can organize this training at your preferred date and location. Contact Us!

Who Should Attend

IT professionals, Forensics and Incident Handling Specialists, Security Consultants, Enterprise Administrators, Infrastructure Architects, Security Professionals, Systems Engineers, Network Administrators and other people responsible for implementing network and perimeter security

Training Outline

Module 1: Introduction to Incident Handling 

1. Types and Examples of Cybersecurity Incidents 

2. Signs of an Incident 

3. Incident Prioritization 

4. Incident Response and Handling Steps 

5. Procedures and Preparation 


Module 2: Securing Monitoring Operations 

1. Industry Best Practices 

2. Detecting Malware via DNS logs 

3. Configuration Change Management 

4. Leveraging Proxy and Firewall Data 

5. Monitoring Critical Windows Events 

6. Detecting Malware via Windows Event Logs 


Module 3: Network Forensics and Monitoring 

1. Types and approaches to network monitoring 

2. Network evidence acquisition 

3. Network protocols and Logs 

4. LAB: Detecting Data Thievery 

5. LAB: Detecting WebShells 

6. Gathering data from network security appliances 

7. Detecting intrusion patterns and attack indicators 

8. Data correlation 

9. Hunting malware in network traffic 

10. Encoding and Encryption 


Module 4: Windows Internals 

1. Introduction to Windows Internals 

2. Fooling Windows Task Manager 

3. Processes and threads 

4. PID and TID 

5. Information gathering from the running operating system 

6. Obtaining Volatile Data 

7. A deep dive to Autoruns 

8. Effective permissions auditing 

9. PowerShell get NTFS permissions 

10. Obtaining permissions information with AccessChck 

11. Unnecessary and malicious services 

12. Detecting unnecessary services with PowerShell 


Module 5: Memory Dumping and Analysis 

1. Introduction to memory dumping and analysis 

2. Creating memory dump - Belkasoft RAM Capturer and DumpIt 

3. Utilizing Volatility to analyze Windows memory image 

4. Analyzing Stuxnet memory dump with Volatility 

5. Automatic memory analysis with Volatile 


Module 6: Indicators of compromise 

1. Yara rules language 

2. Malware detonation 

3. Introduction to reverse engineering 


Module 7: Storage Acquisition and Analysis 

1. Introduction to storage acquisition and analysis 

2. Drive Acquisition 

3. Mounting Forensic Disk Images 

4. Introduction to NTFS File System 

5. Windows File System Analysis 

6. Autopsy with other filesystems 

7. Building timelines Module 

8: Reporting – Digital Evidence This module covers the restrictions and important details about digital evidence gathering. Moreover, a proper structure of digital evidence report will be introduced. 

Why Choose Bilginç IT Academy

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Masterclass: Forensics and Incident Handling Training in United States of America. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including United States of America, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Masterclass: Forensics and Incident Handling Training in United States of America. Our hand-picked classroom venues in United States of America offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginc IT Academy’s Onsite Masterclass: Forensics and Incident Handling Training in United States of America. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Avaible Training Dates

Join our public courses in our United States of America facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
08 April 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
09 April 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
12 April 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
19 April 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
22 April 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
06 May 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
25 May 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago
25 June 2026 (5 Days)
New York, San Francisco, Austin, Seattle, Chicago

The United States continues to define the global frontier of technology and innovation, serving as the home to the world's most influential tech titans. From the legendary Silicon Valley and San Francisco Bay Area to emerging hubs like Austin, Seattle, and the Silicon Alley in New York, the US ecosystem remains unparalleled. Top-tier institutions such as MIT, Stanford, and Carnegie Mellon provide the research backbone for breakthroughs in Artificial Intelligence, Quantum Computing, and Cybersecurity. Our training programs are meticulously aligned with these industry-leading standards, ensuring that professionals can navigate the complexities of the modern digital landscape. We bridge the gap between academic theory and high-stakes corporate execution in the most competitive tech market on Earth.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.