Download for free
Incident Response Plan Template
Complete incident response plan template with the 6 NIST phases.
Presentation
Master advanced forensic analysis and cybersecurity incident response techniques. This intensive 4-day cyber security training teaches you to collect, analyze, and preserve digital evidence while strengthening your information system security.
Objectives
- Master proper response procedures when intrusions occur on machines or networks
- Collect and preserve electronic evidence integrity within the legal framework
- Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
- Strengthen IS security after a security incident
- Write a legally exploitable investigation report
Target Audience
- →System and network engineers/administrators
- →Information Security Managers (CISO)
- →SOC analysts and CERT/CSIRT teams
- →IT security consultants
- →Technical auditors and pentesters
- →IT professionals moving into incident response
Prerequisites
Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.
Frequently Asked Questions
Prerequisites
Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.
Target Audience
- →System and network engineers/administrators
- →Information Security Managers (CISO)
- →SOC analysts and CERT/CSIRT teams
- →IT security consultants
- →Technical auditors and pentesters
- →IT professionals moving into incident response
Expected Outcomes
Master proper response procedures when intrusions occur on machines or networks
Collect and preserve electronic evidence integrity within the legal framework
Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
Strengthen IS security after a security incident
Write a legally exploitable investigation report
Companies in Austin using this training
- Dell Technologies - Awareness training for 500+ employees
- IBM - Ongoing certification program
- Oracle - Security audit and custom training
- Capital Factory startups - Monthly group training sessions
Regulatory Compliance
Texas Privacy Protection Act, HIPAA (healthcare), SOX (public companies), GLBA (financial services), CMMC (defense), SEC cybersecurity disclosure rules, SOC 2 and ISO 27001 for tech sector
FAQs
Ready to get started?
Next session in Austin
February 28, 2026