Virtual classroom for incident response
Posted on 18 March 2013.
To provide digital investigators and other incident responders the tools and skills to detect and respond to targeted attacks, HBGary announced a series of new live online training courses. Courses include Active Defense, Basic Malware Analysis Using Responder Pro and Advanced Malware Analysis Using Responder Pro.

Course instructors work within HBGary’s Field Services division and use HBGary products in real-world scenarios every day to detect malware including rootkits and zero-days and counter targeted attackers.

CPE credits are available based on a 24-hour-class. Courses are open to all attendees and prerequisite courses or experience is not required to attend an HBGary online course. However, for the Advanced Malware Analysis class, experience with concepts in Reverse Engineering and Assembly Language is recommended.

“We are pleased to now offer our popular instructor-led courses in a new virtual classroom. Memory forensics is one of the hottest areas in the security industry and the demand for quality instruction to use memory forensics to conduct digital investigations has never been greater. By taking our online courses, students not only have access to the defacto industry standard technology and experienced instructors, they benefit from the reduced cost and convenience of taking these courses on their own computer at home or in their office,” said Mike Gurzi, HBGary Manager of Services Operations.

Classes are taught live Monday thru Friday from 10:00 a.m. – 1 p.m. PT, providing a total 24 hours of content and includes “at you own pace” labs. (Friday classes can go longer to review lab exercises).

To facilitate instruction, students are given access to a Training Server so they can have a working copy of the given application and run student lab exercises. Course fees include: Access to the Virtual Classroom, Lab Server for “at you own pace’ exercises during the class week, and 6 month access to your class’s recorded sessions for ongoing review and follow-up.





Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //