Select Your City
Select your city to view local pricing, upcoming sessions, and region-specific information.
Can't find your city? We also offer remote training sessions.
Download for free
Incident Response Plan Template
Complete incident response plan template with the 6 NIST phases.
Presentation
Master advanced forensic analysis and cybersecurity incident response techniques. This intensive 4-day cyber security training teaches you to collect, analyze, and preserve digital evidence while strengthening your information system security.
Objectives
- Master proper response procedures when intrusions occur on machines or networks
- Collect and preserve electronic evidence integrity within the legal framework
- Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
- Strengthen IS security after a security incident
- Write a legally exploitable investigation report
Target Audience
- →System and network engineers/administrators
- →Information Security Managers (CISO)
- →SOC analysts and CERT/CSIRT teams
- →IT security consultants
- →Technical auditors and pentesters
- →IT professionals moving into incident response
Prerequisites
Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.
Frequently Asked Questions
Questions about the program?
Prerequisites
Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.
Target Audience
- →System and network engineers/administrators
- →Information Security Managers (CISO)
- →SOC analysts and CERT/CSIRT teams
- →IT security consultants
- →Technical auditors and pentesters
- →IT professionals moving into incident response
Expected Outcomes
Master proper response procedures when intrusions occur on machines or networks
Collect and preserve electronic evidence integrity within the legal framework
Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
Strengthen IS security after a security incident
Write a legally exploitable investigation report
Why choose our training?
- Certified instructors with field experience
- Up-to-date content with latest 2025 threats
- Practical approach: 60% hands-on exercises
- Complete course materials included
- In-person in 10 cities + remote option
- Satisfaction rate: 4.8/5 (127 reviews)
Availability
Sessions available year-round in our 10 cities. In-person and remote training available. Request the complete schedule for your city.
FAQs
Ready to get started?
Select your city to view upcoming sessions and local pricing
Available on-site in 13 cities and via remote training