For 20 years InfoSec has been one of the most awarded and trusted information security training vendors — 40+ industry awards!
We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.
IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.
InfoSec Institute offers this hands-on Incident Response and Network Forensics course that covers the essential information you need to know in order to properly detect, contain and mitigate security incidents. Security incidents are a way of life in the modern world, and how organizations respond to them makes a massive difference in how much damage is ultimately done. In this five-day course, you learn the ins and outs of incident response, as well as the tools of the trade used by incident responders on a daily basis.
This course from InfoSec Institute helps you fully understand how systems are compromised and what traces are left behind by attackers on the network, on disk, and in volatile memory. The Incident Response and Network Forensics course addresses cutting edge attack vectors as well as tried and true methods for compromise. You leave the five-day course with the knowledge of how to prevent incidents and the skills to defend against a security incident if it does happen.
Incident Response and Network Forensics Training Boot Camp
Exam Pass Guarantee — If you don’t pass your exam on the first attempt, get a second attempt for free; includes the ability to re-sit the course for free for up to one year
100% Satisfaction Guarantee — If you’re not 100% satisfied with your training at the end of the first day, you may enroll in a different Flex Pro or Flex Classroom course
Knowledge Transfer Guarantee — If an employee leaves within three months of obtaining certification, InfoSec Institute will train a different employee at the same organization tuition-free for up to one year
Constructing your Live Incident Response Toolkit
Perform Vulnerability Analysis
The Incident Management Knowledgebase
Triage & Analysis
Volatile Data Sources and Collection
Identify Rogue Processes
Defensive review and recommendations
Secure credential changing process and monitoring
Increased monitoring period – when and how long
Validate the system.
Enable constituents to protect their assets and/or detect similar incidents.
Report and coordinate incidents with appropriate external organizations
CSIH Practice Exam
We will never share any of your information, spam you or annoy you with pushy sales pitches.
It was obvious that the instructor is proficient in the material. He is very friendly and accomodating. It was a pleasure to meet him and learn from him, I look forward to the opportunity to take another class from him. I enjoyed the labs and overall they were very good and informative. We were always able to ask for instructor help. I would have liked to seems demo on the reverse engineering of the Trojan but even at that it was still a good lab.