Training Duration (Days)
- There is no pre-requisite for the programme
- Microsoft + Linux + Cisco will be added advantage
By the end of this course, you will be able to:
- Understand various attackers’ techniques and targeted attack anatomy.
- Apply specific methods of monitoring and detection.
- Follow incident response workflow.
- Reconstruct incident chronology and logic.
- Able to manage Mobile Forensic