Menu Close

Forensics Analyst Formation

CECyber Forensics Analyst Formation

This program provides students with the skills to identify and contain attacks that require computer forensic analysis. The course teaches concepts of computer forensic analysis, with the realization of practical scenarios for simulating cyber attacks, followed by an analysis of different aspects of cybersecurity.

Content

CompTIA Cysa+ (40h)*

Validates the knowledge and skills needed to detect cyber threats, analyze and interpret data, identify and resolve vulnerabilities, suggest preventive measures, respond and recover effectively if information security incidents occur.

* Does not include voucher for the CompTIA certification test.

CECyber Range Experience (40h)

The cyber attack scenarios in this program combine incident response and extensive forensic analysis. There are 9 practical classes in the Cyberbit Range, with scenarios of different levels of difficulty, ranging from 3 to 6 hours each. Scenarios contemplated:

  • Apache Shutdown;
  • Trojan Data Leakage;
  • DDoS SYN Flood;
  • SQL Injection;
  • DB Dump via FTP Exploit;
  • Java NMS Shutdown;
  • Java SendMail;
  • Trojan Share Privilege Escalation;
  • WMI Worm.

Target Audience

IT Professionals, Information Security and SOC Teams.

Level of expertise

Advanced.

Prerequisites

Knowledge in Computer Networks, Windows and Linux Operating Systems, basic knowledge in log analysis.

Duration

80 hours.

Format

Presencial / Online.

Skills acquired

  • Definition and use of cybersecurity concepts and terminology;
  • Understanding the network architecture and infrastructure;
  • Recognition of malware and hacker behaviors;
  • Collecting forensic data and investigating a cyber attack;
  • Analysis in Windows and Linux logs;
  • Analysis of process automation and malware dissemination scripts;
  • Analysis of Ransomware Decryptor Scripts;
  • Analysis of program codes in Power Shell and Bash;
  • Containment of attacks originating from Trojans;
  • Analysis of vulnerabilities in databases.