CREST Practitioner Intrusion Analyst Training in South Africa

  • Learn via: Classroom
  • Duration: 5 Days
  • Level: Intermediate
  • Price: From €5,018+VAT
We can host this training at your preferred location. Contact us!

Delegates are provided with a Pearson Vue exam voucher for the CPIA examination as part of the course fee. This course prepares the student for a career in Incident Response and provides all of the tools and teaches the techniques needed by a practicing professional. This is the first cross discipline course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering.
This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path.
You will learn how to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and re-construct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Quizzes and tests throughout, with feedback, re-enforce the knowledge and prepare you for the CPIA multiple choice exam.
Following this course a student may challenge the CREST core skills exam resulting in the CREST Practitioner Intrusion Analyst (CPIA) professional qualification, which is a pre-requisite for the CREST Registered Intrusion Analyst (CRIA) professional qualification. The CRIA exam can be challenged later, once more experience has been gained in real life scenarios.

Target Audience

  • Aspiring information security personnel who wish to be part of an incident response team
  • Existing practitioners wishing to become CREST Registered
  • System administrators who are responding to attacks
  • Incident handlers who wish to expand their knowledge into Digital Forensics
  • Government departments who wish to raise and baseline skills across all security teams
  • Law enforcement officers or detectives who want to expand their investigative skills
  • Information security managers who would like to brush up on the latest techniques and processes in order to understand information security implications
  • Anyone meeting the pre-requisites who is considering a career in Intrusion Analysis or Digital Forensics

A good appreciation of the technical aspects of ICT and one year’s experience in network / server technical administration / operations. QACYSEC – Cyber Security Bootcamp is recommended.

MODULE 1 - Soft Skills and Incident Handling

  • Engagement Lifecycle Management
  • Incident Chronology
  • Law & Compliance
  • Record Keeping, Interim Reporting & Final Results
  • Threat Assessment

MODULE 2 - Core Technical Skills

  • IP Protocols
  • Network Architectures
  • Common Classes of Tools
  • OS Fingerprinting
  • Application Fingerprinting
  • Network Access Control Analysis
  • Cryptography
  • Applications of Cryptography
  • File System Permissions
  • Host Analysis Techniques
  • Understanding Common Data Formats

MODULE 3 - Background Information Gathering & Open Source

  • Registration Records
  • Domain Name Server (DNS)
  • Open Source Investigation and Web Enumeration
  • Extraction of Document Meta Data
  • Community Knowledge

MODULE 4 - Network Intrusion Analysis

  • Network Traffic Capture
  • Data Sources and Network Log Sources
  • Network Configuration Security Issues
  • Unusual Protocol Behaviour
  • Beaconing
  • Encryption
  • Command and Control Channels
  • Exfiltration of Data
  • Incoming Attacks
  • Reconnaissance
  • Internal Spread and Privilege Escalation
  • False Positive Acknowledgement

MODULE 5 - Analysing Host Intrusions

  • Host-Based Data Acquisition
  • Live Analysis Laboratory Set-up
  • Windows File System Essentials
  • Windows File Structures
  • Application File Structures
  • Windows Registry Essentials
  • Identifying Suspect Files
  • Storage Media
  • Memory Analysis
  • Infection Vectors
  • Malware Behaviours and Anti-Forensics
  • Rootkit Identification
  • Live Malware Analysis

MODULE 6 - Reverse Engineering Malware

  • Windows Anti-Reverse Engineering
  • Functionality Identification
  • Windows NT Architecture
  • Windows API Development
  • Binary code structure
  • Cryptographic Techniques
  • Processor Architectures
  • Windows Executable File Formats
  • Hiding Techniques
  • Malware Reporting
  • Binary Obfuscation
  • Behavioural Analysis

MODULE 7 - CPIA Exam Preparation & Mock Exam

  • CPIA- Examination Guidance
  • CPIA- Mock Examination

EXAM - Booked directly via CREST

The CREST Practitioner Intrusion Analyst (CPIA) examination is an entry level qualification that tests a candidate’s knowledge in all three subject areas of network intrusion, host intrusion and malware reverse engineering at a basic level below that of the main

Registered and Certified qualifications.

Success will confer the CREST Practitioner status to the individual. This qualification is a prerequisite for the CREST Registered Intrusion Analyst (CRIA) examination and comprises a multiple choice written only examination.

CREST Accredited Training

CREST has assessed and accredited this training course confirming alignment with 100% of the CREST CPIA exam syllabus.



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

20 January 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
€5,018 +VAT
Book Now
14 February 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
20 January 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
€5,018 +VAT
Book Now
01 March 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
14 February 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
16 March 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
01 March 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
07 April 2025 (5 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
€5,018 +VAT
Book Now

Related Trainings

CREST Practitioner Intrusion Analyst Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.