CREST Registered Intrusion Analyst, CRIA

This is the first cross-discipline training course of its kind that covers the essential knowledge and hands-on practical skill set needed for intrusion detection, incident handling, computer/network forensics, and malware reverse engineering. Crest CRIA is one of the best computer security careers. The CREST registered intrusion analyst professionals every team member look for.

Cyber Skills Training - Image of a woman

Course Style

Live Instructor Led. Face-to-face or attend from anywhere.

Skill up and get certified, guaranteed

Exam Pass Guarantee

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, You get to re-sit the course for free
100% Satisfaction Guarantee

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Classroom course.
Knowledge Transfer Guarantee

Knowledge Transfer Guarantee

High Impact Learning Solutions Designed for students to acquire skills and obtain certification,.

What is included?

  • 5 days of training.
  • Course material/Slides.
  • Examination Fees.
  • 90% Certification Success in First Attempt.
  • Classroom training or attend from anywhere.
  • Training delivered by Professionals with enormous industry experience.

The CREST registered intrusion analyst is aware of malware reverse engineering, digital forensics, security baseline for existing people etc. To get the analyst CRIA professional qualification is important to crack the intrusion analyst examination. The analysis and digital forensics course raises the bar and makes you fit for the position of CREST intrusion analyst.

What you will Learn?

With the first cross-discipline course, you will learn how to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and reconstruct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Practical exercises to ensure that the learned can be put to work immediately and that you are prepared for the CRIA practical exam. The registered intrusion analyst CRIA forensics professionals every team look for should have attempted core skills exam resulting in intrusion analyst CRIA professional.

Award-winning training that you can trust

Who should attend?

  • Aspiring information security personnel who wish to be part of an Incident Response team.
  • Existing practitioners wishing to become Registered.
  • System administrators who are responding to attacks.
  • Incident handlers who wish to expand their knowledge into Digital Forensics.
  • Government departments who wish to raise and baseline skills across all security teams.
  • Law enforcement officers or detectives who want to expand their investigative skills.
  • Information security managers who would like to brush up on the latest techniques and processes in order to understand information security implications. The intrusion analyst training is must to get started with the intrusion analysis. They are the digital forensics professionals every business need.

Course Dates

15 -19 Nov, 2021

Course Outline

Soft Skills and Incident Handling

  • Incident Chronology.
  • Record Keeping, Interim Reporting and Final Results.

Core Technical Skills

  • IP Protocols.
  • Common Classes of Tools.
  • Application fingerprinting.
  • Network Access Control Analysis.
  • Host Analysis Techniques.

Networking Intrusion Analysis

  • Data Sources and Network Log Sources.
  • Beaconing.
  • Command and Control Channels.
  • Exfiltration of Data.
  • Incoming Attacks.
  • Reconnaissance.
  • Internal Spread and Privilege Escalation
  • False Positive Acknowledgement

Analysing Host Intrusions

  • Windows File System Essentials.
  • Windows File Structures.
  • Application File Structures.
  • Windows Registry Essentials.
  • Identifying Suspect Files.
  • Memory Analysis.
  • Infection Vectors.
  • Live Malware Analysis.

Reverse Engineering Malware

  • Functionality Identification.
  • Processor Architectures.
  • Windows Executable File Formats.



Are you ready to get started?