|IACIS Cyber Incident Forensic Response Training Course|
The IACIS Cyber Incident Forensic Response (CIFR) Training Program is a 2-week course of instruction designed to provide students with detailed study of traces left behind on computers and networks unique to intrusions and malware incidents. At the conclusion of this course, students will have a clear understanding of responding to and managing intrusions and malware incidents, what artifacts are left during these incidents, and how knowledge of these artifacts can play a significant role in the forensic and investigative processes.
Through a variety of lectures, instructor-led and independent hands-on practical exercises, and independent laboratory activities, students will learn how to find traces left behind on Windows and Linux operating systems and on network devices, focusing on identifying intrusion and malware artifacts. Students will spend a week focusing their analysis at the network level, analyzing a variety of logs, investigating network traffic captures and conducting drive analysis and imaging across a network. Additionally, students will spend a week at the host level, focusing on intrusion and malware artifacts on Windows and Linux hosts. Finally, students will become familiar with RAM capture and analysis, and basic malware analysis concepts.
The CIFR Training Program is designed to build on and expand one's existing forensic knowledge and skill set and is not an entry level class. Prospective students are expected to be proficient with Windows forensics and common forensic concepts and tools. Students should be competent with the use of virtualization software (VMWare, Virtualbox, etc.) and, since portions of the analysis are conducted with a Linux VM, students should be competent at basic Linux file system navigation commands (ls, mkdir, etc.) Students will be provided an analysis system during the class but will be provided instructions for bringing Windows and Linux VMs with them for use during the class.
EQUIPMENT: All CIFR students will receive a laptop computer to take home with them at the successful conclusion of the training event.
PREREQUISITE: Membership Required.
WHEN: May 30 - June 10, 2016
WHERE: Dell SecureWorks:
REGISTRATION: To purchase training, you must first be a member of IACIS. To apply for membership, complete the membership application by clicking on this hyperlink to the membership application. Your course tuition will cover the cost of your first year of membership. Once your membership application has been approved, you can purchase the training product by logging onto the IACIS web site and clicking on the Purchase Training/Certification button.
COST: $2,795 US Dollars
Cancellation of this class may occur if there are insufficient students registered. In the event of a cancellation, personnel will typically be notified by e-mail within 48 hours of the registration closure date. IACIS is not responsible for any individual expenses incurred as a result of a cancellation. The limit of IACIS financial liability is a full refund of the course fee.
****Payment MUST BE RECEIVED at least 30 days prior to the first day of class. Any payment arrangements other than payment through the website or payment via invoice must be approved by the IACIS Treasurer prior to admittance into the course. Please contact the treasurer for questions and approval (email@example.com)
Cancellations within 45 days from the start of class to 30 days from the start of class will be subject to a $150 cancellation fee. There will be no refunds within 30 days from the start of class.****
COURSE NOTES: Please read the following notes regarding this class:
Classes begin at 8:00 AM ET and conclude at 5:00 PM ET, each day, with a one hour lunch break. Classes will end at 5:00 PM ET on the last day of class. Please do not arrange for departing flights prior to 7:00 PM ET to allow time for travel to the airport and any security clearances.
The dress code for the conference is business casual (collared shirts and slacks). The wearing of shorts, flip flops, tank tops, etc. is not allowed in the classroom. Personal computers are not permitted in the classroom.Students are required to attend all classes to successfully complete the program. Students who fail to meet the attendance requirements will not be issued a certificate at the conclusion of the program.
There are a number of hotels in the area but the closest is The Marriott
Director of Marketing.
IACIS- International Association of Computer Investigative Specialists
CEN 2017 Member Conference
5/25/2017 » 5/26/2017
Bryant University and OSHEAN 2017 Cyber Security Exchange Day