!Latest cybersecurity news and updates. Contact us
View general overview

Forensic Analysis and Security Incident Response Training Riyadh

Master advanced forensic analysis and cybersecurity incident response techniques. This intensive 4-day cyber security training teaches you to collect, analyze, and preserve digital evidence while strengthening your information system security.

4 daysAdvancedBlended (in-person + remote)

In Riyadh, our cybersecurity training supports Riyadh businesses in their secure digital transformation. Organizations like Saudi Aramco, SABIC, STC (Saudi Telecom) trust our expertise to train their teams. Based in KACST (King Abdulaziz City for Science and Technology), we understand the specific challenges of the Saudi Arabia market and adapt our programs to local realities.

Key Information

Duration4 days
ModeBlended (in-person + remote)
LevelAdvanced
LocationRiyadh
Template

Download for free

Incident Response Plan Template

Complete incident response plan template with the 6 NIST phases.

Presentation

Master advanced forensic analysis and cybersecurity incident response techniques. This intensive 4-day cyber security training teaches you to collect, analyze, and preserve digital evidence while strengthening your information system security.

Objectives

  • Master proper response procedures when intrusions occur on machines or networks
  • Collect and preserve electronic evidence integrity within the legal framework
  • Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
  • Strengthen IS security after a security incident
  • Write a legally exploitable investigation report

Target Audience

  • System and network engineers/administrators
  • Information Security Managers (CISO)
  • SOC analysts and CERT/CSIRT teams
  • IT security consultants
  • Technical auditors and pentesters
  • IT professionals moving into incident response

Prerequisites

Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.

Frequently Asked Questions

Prerequisites

Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.

Target Audience

  • System and network engineers/administrators
  • Information Security Managers (CISO)
  • SOC analysts and CERT/CSIRT teams
  • IT security consultants
  • Technical auditors and pentesters
  • IT professionals moving into incident response

Expected Outcomes

Master proper response procedures when intrusions occur on machines or networks

Collect and preserve electronic evidence integrity within the legal framework

Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)

Strengthen IS security after a security incident

Write a legally exploitable investigation report

Companies in Riyadh using this training

  • Saudi Aramco - Awareness training for 500+ employees
  • SABIC - Ongoing certification program
  • STC (Saudi Telecom) - Security audit and custom training
  • KACST (King Abdulaziz City for Science and Technology) startups - Monthly group training sessions

Regulatory Compliance

NCA (National Cybersecurity Authority), ECC (Essential Cybersecurity Controls), PDPL (Personal Data Protection Law), SAMA (Saudi Arabian Monetary Authority) cybersecurity framework, CCC (Critical Systems Cybersecurity Controls), Vision 2030 compliance

FAQs

What are the prerequisites for this cyber security training course?
This advanced training requires solid knowledge of IT security, networking, and system administration. Practical IT experience is strongly recommended. A pre-assessment test is offered before the training.
Does this training include a cybersecurity analyst certification?
This training does not deliver an official certification but provides excellent preparation for recognized forensic certifications (GCFE, GCFA, EnCE). A training certificate is issued upon completion.
Is the training eligible for OPCO funding?
Yes, this training is eligible for OPCO Mobilités funding and can be covered under your company's skills development plan.
What is the proportion of hands-on work in this cyber security training course?
Approximately 60% of training time is dedicated to hands-on work. Each module includes practical exercises: log analysis, forensic tool usage (Splunk, Volatility, SNORT), incident simulations.
Can this training be taken remotely?
Yes, the training is available in-person at Paris La Défense or remotely with the same hands-on labs via a secure virtual environment. Both formats offer the same educational quality.

Ready to get started?

Next session in Riyadh

March 17, 2026

Forensic Analysis Training Riyadh | Cyber Security Incident Response | Cagpemini