About Course
This course aims to equip participants with skills to conduct incident response investigations. They will learn how to apply evolving incident response methods to dynamic cyber threats, and how to create threat intelligence to stage efficient defense strategies for on-prem and cloud environments. They will be able to identify the latest threats to enterprises; from watering hole attacks to MFA bypass in cloud applications service, allowing participants to understand the mindset of bad actors and how to anticipate their moves. This course will provide the necessary information participants will need to understand how attackers run scans, conduct exploits, and build persistence in traditional and cloud systems. It includes 30% hands on exercises and visual exercises to help participants retain the course material. At the end of the course, they will be prepared to conduct cyber investigations which will increase their cyber career skills.