The definitive course for those who want to learn all about analysing events related to compromises or breaches in Windows Systems
We have trained over 750 organizations including:
This course will help you understand and review details regarding events related to compromise of the system. Windows Memory Forensics is widely used in malware analysis and finding evidence about Windows systems in case of a cyber-attack.
In this course, you will learn how to gather evidence related to infected Windows systems and also how to use Windows memory forensics in analysing malwares.
After the completion of this course, you will be able to:
The playbooks training course was a good 'part-2' to the CIPR and went into greater depth in a number of areas. The day was fun and Amar kept us moving along at a good pace.
Enjoyed the course. Good mix of attendees and plenty of lively conversation. Amar steered us through it all admirably.
Overall the course was very good. I would strongly recommend this training to anyone who is involved in Cyber Security or has control of information assets.
It was a great workshop with a lot of interesting people and a great learning experience.
This was a very helpful day and opportunity to speak with a number of operational incident responders to discuss what really works in practice and not just in theory. I gained a great deal from the day, particularly around the construction of bespoke playbooks and also a variety of useful resources to inform my learning. A really good day.
All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.
Find out more about our one day public courses or internal workshops, please complete the form below.