Course description

This comprehensive course moves beyond theoretical security to the front lines of Incident Response (IR). You will dive into the full lifecycle of a security breach—from the initial "click" on a phishing link to the final post-incident report.

Participants will learn how to build and manage a Computer Security Incident Response Team (CSIRT), utilize industry-standard frameworks like NIST SP 800-61 and SANS, and master the technical tools required for live memory forensics and log analysis. Whether you are aiming to be a SOC Analyst or an IR Consultant, this course provides the tactical skills to stay calm and effective when a network is under fire.

What will i learn?

  • Develop an IR Plan: Create a customized incident response playbook for various attack vectors (Ransomware, DDoS, Data Exfiltration).
  • Perform Live Analysis: Conduct memory and disk forensics to identify malicious processes and persistence mechanisms.
  • Master Containment: Apply immediate strategies to isolate infected systems without destroying volatile evidence.
  • Log Correlation: Analyze logs from SIEMs, EDRs, and firewalls to reconstruct an attacker’s timeline.

Requirements

  • Basic understanding of networking (TCP/IP, DNS, Firewalls).
  • Familiarity with Linux and Windows command-line interfaces.
  • Foundational knowledge of cybersecurity principles (Security+ level or equivalent).
  • A computer capable of running virtual machines for hands-on labs.

Frequently asked question

While the labs are technical, the framework and planning sections are vital for IT managers and team leads who need to coordinate a response.

Yes. You will get hands-on experience with industry tools such as Wireshark, FTK Imager, Volatility, and various SIEM platforms.

The content aligns closely with the GCIH (GIAC Certified Incident Handler) and EC-Council ECIH curricula.

faramaye Ireoluwa Victor

₦450000

₦500000

Lectures

0

Skill level

Advanced

Expiry period

2 Months

Certificate

Yes

Share this course

Related courses