CREST Registered Intrusion Analyst, CRIA
This is the first cross-discipline training course of its kind that covers the essential knowledge and hands-on practical skills needed for intrusion detection, incident handling, computer/network forensics, and malware reverse engineering.
Live Instructor Led. Face-to-face or attend from anywhere.
Skill up and get certified, guaranteed
What is included?
- 5 days of training.
- Course material/Slides.
- Examination Fees.
- 90% Certification Success in First Attempt.
- Classroom training or attend from anywhere.
- Training delivered by Professionals with enormous industry experience.
What you will Learn?
You will learn how to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and reconstruct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Practical exercises throughout ensure that the skills learned can be put to work immediately and that you are prepared for the CRIA practical exam.
Award-winning training that you can trust
Who should attend?
- Aspiring information security personnel who wish to be part of an Incident Response team.
- Existing practitioners wishing to become CREST Registered.
- System administrators who are responding to attacks.
- Incident handlers who wish to expand their knowledge into Digital Forensics.
- Government departments who wish to raise and baseline skills across all security teams.
- Law enforcement officers or detectives who want to expand their investigative skills.
- Information security managers who would like to brush up on the latest techniques and processes in order to understand information security implications.
25 – 29 Jan, 2021
24 – 28 May, 2021
15 -19 Nov, 2021
Soft Skills and Incident Handling
- Incident Chronology.
- Record Keeping, Interim Reporting and Final Results.
Core Technical Skills
- IP Protocols.
- Common Classes of Tools.
- Application fingerprinting.
- Network Access Control Analysis.
- Host Analysis Techniques.
Networking Intrusion Analysis
- Data Sources and Network Log Sources.
- Command and Control Channels.
- Exfiltration of Data.
- Incoming Attacks.
- Internal Spread and Privilege Escalation
- False Positive Acknowledgement.
Analysing Host Intrusions
- Windows File System Essentials.
- Windows File Structures.
- Application File Structures.
- Windows Registry Essentials.
- Identifying Suspect Files.
- Memory Analysis.
- Infection Vectors.
- Live Malware Analysis.
Reverse Engineering Malware
- Functionality Identification.
- Processor Architectures.
- Windows Executable File Formats.
- Behavioural Analysis.