Cyber Security Course Descriptions
Certified Network Forensic Analysis Manager
The Certified Network Forensic Analysis Manager certification course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies. Civilian personnel outside the law enforcement community are also authorized to attend on a case-by-case basis.
This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 16 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Investigating Windows Systems; Investigating Applications; and, Malware Triage.
Certified Disaster Response and Recovery Manager
Business Continuity and Disaster Response / Recovery is the process of preparing processes, policies, and procedures that follow in the event of a significant and unplanned operational disruption. The Certified Disaster Response and Recovery Manager training course prepares students for industry certification in Business Continuity planning and Disaster Recovery missions.
As businesses face a wide range of daily risks – including cyber-attacks, human error, technical failures, and natural disasters – it’s vital they create practical plans to sustain their security posture, financial health, and industry / brand reputation to maintain long-term success. Students will cover topics such as: BCP Design and Development Strategies, Selection of Risk Management Frameworks, Qualitative and Quantitative Analysis Strategies, Creating Asset Inventories and Resource Profiles, Recovery Site Management and Workflows, Reviewing Cloud Computing Service Agreements, Cloud Data Security Strategies, and the Impact of Legal Requirements on Cloud Storage Solutions.
Contact Us for The Ultimate Training Experience