KNIFE – Known Network Intrusion Forensic Examinations (Live Remote Training)
4-day Advanced Level Course – Live Remote
What is Live Remote Synchronous Training?
Remote Synchronous Training (RST) allows the attendee to participate in a structured training courses remotely, in the comfort of your own office. It eliminates travel costs and provides a fully interactive environment, just like being in the classroom! RST delivery is specifically designed to simulate a live learning environment. Students have two-way communication with the instructor as well as the other students in the class using a typical hardware setup from their remote location. Instructors can monitor and interact with all students at the same time. When needed, instructors can assist students by physically interacting with his/her assigned machine in the Spyder Forensics remote classroom.
Why choose a Remote class?
Content is delivered exactly the same as in our live classes · Full interaction with the trainer and other course attendees · No travel costs and enjoy the class at your preferred location · Receive the same courseware as an in-person class, i.e. 400+ page color printed student manual for post class reference, USB with datasets and student files · Use of unique datasets developed by Spyder Forensics covering all artifacts covered in this class and others in our curriculum · Post class access the Spyder Forensics Academy (LMS) for supplementary courseware and online electronic version of the training manual
What you will need:
A computer (Windows or Apple) connected to the internet allowing access to GoToTraining™ for instructor delivery and RemotePC™ to interact with the remote classroom PC · A microphone to interact via voice with the class (not required as Chat window is always available) · Speakers to hear the class being delivered · Preferred 2 monitors to open multiple windows (GoToTraining and RemotePC windows)
What you will receive:
Printed course manual · Course certificate
This 4-Day advanced level class is designed to provide the student with the skills and techniques to response to a cyber intrusion incident. The students will learn the anatomy of an intrusion, collection of memory and volatile artifacts, and techniques to unravel the mystery of how the network was compromised.
The course will follow adult learning principles through training aids such as presentations, diagrams and practical instructor lead examples. Each artifact covered will be presented in either one or two 50 minute sessions followed by review questions. Students will be given the opportunity throughout the course to ask questions and discuss objectives covered in more detail. Throughout each day students will have practical exercises to work on in order to reinforce the topics with a final practical at the culmination of the training.
This hands-on course is geared towards forensic investigators with 6+ months experience in forensic case work with a basic understanding of Microsoft data structures.