$867.50 – $1,412.50

Cyber Security and Incident Response

Event Information

Share this event

Date and Time

Location

Location

Orchard Parade Hotel

1 Tanglin Road

Singapore, 247905

Singapore

View Map

Refund Policy

Refund Policy

Refunds up to 7 days before event

Friends Who Are Going
Event description

Description

Please check the complete details here:

http://www.fortisacademy.sg/course/cyber-security-incident-response/


And download the complete brochure here:

http://www.fortisacademy.sg/brochure-cyber-security-incident-response/


Overview

Malicious code has moved well beyond mass-mailing viruses with disk-wiping payloads created by misunderstood "geniuses" with a grudge. A significant percentage of today's malware is intended to allow crimes to be committed against its victims. In many cases, the crimes are aimed at specific organizations or industry groups.

For an IT security professional’s team, it is very important to conduct rapid and accurate analysis on the network traffics in order to figure out the motive and inner workings of the anonymous attacks.

This is an introduction to practical aspects of cyber security incident response. Our plan is to offer knowledge and practical analytical skills to implement effective methods of collection, analysis and report an incident.

Learning Objectives

  • Cyber security incident
  • Cyber incident response life cycle
  • Identifying and gathering critical information
  • Recognizing signs of attacks
  • Understanding behavioral analysis of malicious codes
  • Detecting and analyzing incidents
  • Create an environment to analyze the incidents securely
  • Vulnerability assessment and risk analysis

Who Should Attend?

  • Cyber incident response team member
  • Auditors who need to build deeper technical skills
  • IT security professionals
  • IT manager & Security manager

Program Outlines

Introduction

  • Introduction to Cyber Attacks
  • What is cyber security incident
  • Managing a cyber security incident

Malware & Malicious code

  • Introduction to Malware & Malicious code
  • Evolution of Malware & Motivations
  • Infection methods & introduction to packers

Incident responds Tactics

  • Techniques & procedures to handle intrusions
  • Scoping of an incident and detecting all compromised systems
  • Attack analysis & Risk migration
  • Honeynet & honeypots
  • Process & network Monitor‎

Threat Hunting

  • Identification of Compromised Systems
  • Finding Active and Dormant Malware
  • Network Traffic Analysis Tools (NFATs)

Malware Cleaning Strategy & techniques

  • Malware cleaning steps
  • Identifying Malware Processes
  • Windows services & DLL view
  • Terminating Malicious Processes
  • Finding and Deleting Malware Files

Tools

  • On-Line analysis tools
  • Disassembler and debugger
  • Memory dumper
  • IDS/ IPS
  • Process monitoring/ Network monitoring / Change detection
  • VMware/ Suricata / Tripwire / Filemon / Regmon

Master Trainer: Mr. Ali Fazeli


Ali Fazeli has been involved in the information technology filed since his younger days. He later pursed his higher studies in the field of internet security and management from Curtin University, Australia. He is a highly interactive and innovative trainer, whose work in mainly based on research and applied knowledge from extensive experiences in Computer security and Data recovery. He has extensive experience in digital forensic investigation, Anti-forensic and cyber war.

During his 10 years career, Ali has assisted and trained numerous information technology security professional in Asia. He is accredited as a specialist in the successful investigation and prosecution of fraudsters and other scum from the dark and under world of internet. He has successfully accomplished professional certifications and has managed to use them advantageously for the enhancement of his professional practice in the fields of

  • Project advisory and management
  • IT and VoIP infrastructure
  • LANs and WANs Management
  • Wealth Management knowledge and software consultant
  • Cisco Certified Network Associate (CCNA)
  • Cisco certified network professional (CCNP)
  • Computer Hacking Forensics Investigation

Ali engaged in research opportunities in the sector of Network security Techniques: Data Mining and Data warehousing methodology at University of Curtin, in Australia 2006 and then Tactical Computer Network: Tactical fiber optic network and RF trunk system. “These researches have further cemented my knowledge and has boosted my confidence as a practitioner”, says Ali.

Ali is one of the most versatile IT security professional and expert, with skills ranging from advisory expert to guidance consultant. One of the few of Ali’s expertise lay in lecture deliveries. With a vast knowledge of various IT security sectors, Ali is competent in lecture deliveries on topics such as:

Computer Forensics Investigation and Anti forensics techniques

  • Penetration testing
  • Investigating IT Misuse
  • Wireless Network Hacking
  • Enterprise Network Security
  • Social Network Forensics

Today, Ali spent a substantial amount of his time in advising and trains IT security professionals in maritime industry. As the principal trainer and founder of infinity forensics, Ail has contributed extensively in helping numerous governments and private organizations to face the information technology risk and security.

Currently Ali has been approached by the law enforcement, and requested his knowledge and expertise in creating a customized training and education methodology for the sole purpose of investigating cyber criminals. Since 2007 his company Infinity forensics has been chosen as main partner of X-way software technology AG in Singapore.

Some of the training experience:

  • WinHex, computer forensics and data recovery software training
  • Anti-Forensics VS computer forensic science
  • A practical approach to computer forensics investigation
  • Penetration Testing and Cyber Defense
  • Computer forensics and cyber security
  • Practical Workshop on Mobile Forensics
  • Wireless security and wireless Hacking
  • Social Media forensics & Investigation
  • A practical approach to Open-source intelligence (OSINT)
  • Computer forensics investigation
  • Cyber Security & Intelligence
Share with friends

Date and Time

Location

Orchard Parade Hotel

1 Tanglin Road

Singapore, 247905

Singapore

View Map

Refund Policy

Refunds up to 7 days before event

Save This Event

Event Saved