Intrusion Analysis and Incident Response
Cyber-attacks are becoming an everyday occurrence. Information security specialists have to manage their incident response and intrusion analysis to protect the organization and provide digital evidence where appropriate.
This seminar will provide you with an understanding of the various attack characteristics, an analysis of lessons learned from recent attacks, and allow you to create your own processes for responding to attacks of your enterprise network.
In this 2 day seminar, you will learn from “live” events and scenarios from actual computer incidents. Each “live” exercise will have a series of events from firewall Logs to users calling the help desk, and your task will be to review the information, then using the defined incident response plan, determine what is required to be recorded, reported in the required steps, to move forward. The incidents will increase in scope and become more challenging as the workshop progresses.
Learning Objectives:
- Learn the fundamentals of intrusions
- Examine network traffic for intrusions
- Develop a systematic process for intrusion analysis
- Explore the artifacts of emerging threat attacks
- Establish an incident response lifecycle
- Create a response template for handling basic to advanced attacks
- Process “live” monitored alerts and assess the enterprise threat
- Extract sophisticated malware information from the latest types of attacks
Speaker Bio – Kevin Cardwell —Senior Fellow in CyberSecurity and IT Audit
Kevin is security and IT audit professional. In addition to his training role at CPE Interactive, he is an independent consultant providing consulting services for companies throughout the world. He focuses on computer forensics and hacking courses.
He headed the team that built the U.S. Navy Network Operations and Security Center (NOSC), served as the Leading Chief of Information Security and provided consulting services throughout the world. While in this position, he created a strategy and training plan for the development of an expert team. This effort took personnel with little or no experience and build them into an expert information security team for NOSC.
Kevin is considered an authority on information security and vulnerability assessments. He is a developer, author, instructor in computer forensics and hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses, Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Environments (second edition) and Backtrack: Testing Wireless Network Security.
He has conducted technical presentations at Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences as well as many others.
Kevin holds a bachelor of science degree in computer science from University in California and a Master of science in software engineering from Southern Methodist University (SMU).
Dates
|
Monday, March 18 through Tuesday, March 19, 2019
|
Registration and Breakfast
|
7:30 AM
|
Start
|
8:00 AM
|
Lunch
|
12:00 PM
|
Close
|
4:00 PM
|
Cost:
ISACA Member Price: $549 + GST
Non-Member Price: $699 + GST
CPEs: 16 hours
Register Now!