This is a hands-on course that covers security incidents and intrusions, including identifying and categorizing incidents; responding to incidents; log analysis; malware analysis; capturing volatile information; network traffic analysis; honeypots and honey-nets; open source tools for incident response; creating an incident response team, and ethics in a digital investigation.

Accessibility

Background Colour Background Colour

Font Face Font Face

Font Kerning Font Kerning

Font Size Font Size

1

Image Visibility Image Visibility

Letter Spacing Letter Spacing

0

Line Height Line Height

1.2

Link Highlight Link Highlight

Text Colour Text Colour