“1 Day To Forensics Mastery” — a NEW Crash Course On Security Operations By Paula Januszkiewicz

A must-do for enterprise administrators, infrastructure architects, system engineers & other IT professional responsible for implementing network & perimeter security

$499

Join Now!

How To Outsmart The Hackers

Understanding the internal OS protection mechanisms changes the game when it comes to the security infrastructure in your organization. The problem is… rarely anyone on a team has this kind of expertise.

The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, the company’s most valuable resource — its people — are usually not aware of what is really needed. They often don’t understand a hacker’s possible points of entry, how operating systems are attacked, and how to protect the infrastructure from attacks caused by configuration mistakes.

We’re here to change it. This intensive course on security operations will help you walk in hackers’ shoes and evaluate your infrastructure from their point of view.

Course Formula

Intensive

You’ll get access to the pre-recorded classes (5 modules consisting of about 7 hours of video tutorials) on our special interactive platform.

Flexible

You can finish all the 5 modules in a day or spread it over a few weeks. The decision is yours.

Extra Materials

You’ll get author’s unique tools to download, plus over 300 pages of exercises and presentation slides with notes.

12-Month Access

You’ll get a full year online access to the course. The downloads are yours to keep.

Updated Knowledge

The course is packed with the newest cybersecurity findings, insights and tools.

Course Syllabus

Module 1

Introduction to Incident Response and Handling

~~~~~

  • Types of Computer Security Incidents
  • Examples of Computer Security Incidents
  • Signs of an Incident
  • Incident Prioritisation
  • Incident Response
  • Incident Handling
  • How to Identify an Incident
  • Handling Incidents Techniques
  • Incident Response Team Services
  • Incident Response Plan Checklist

Module 2

System and Network Security Mechanisms

~~~~~

  • Privileges, permissions and rights
  • Passwords security (techniques for getting and cracking passwords
  • Monitoring Registry Activity
  • Services architecture
  • Access tokens

Module 3

Handling Malicious Code Incidents

~~~~~

  • Count of Malware Samples
  • Detecting and analysis of malicious software
  • Tools for malware analysis

Module 4

Securing Monitoring Operations

~~~~~

  • Industry Best Practices
  • Critical Security Controls
  • Host, Port and Service Discovery
  • Vulnerability Scanning
  • Monitoring Patching, Applications, Service Logs
  • Configuring Centralised Windows Event Log Collection
  • Monitoring Critical Windows Events
  • Detecting Malware via Windows Event Logs
  • Scripting and Automation

Module 5

Forensics Basics

~~~~~

  • Computer Forensics
  • Objectives of Forensics Analysis
  • Role of Forensics Analysis in Incident Response
  • Computer Forensic Investigator & Process
  • Gathering the evidence
  • Challenging Aspects of Digital Evidence
  • Forensic Analysis Guidelines & Tools
  • Memory forensics
  • Disk forensics
Join Now!

Click here to browse the modules:

Presenter

Paula Januszkiewicz

Founder and CEO of CQURE

Paula is a Microsoft Security Trusted Advisor, IT Security Auditor and Penetration Tester. On top of that, she’s an Enterprise Security MVP and trainer (MCT). She shares her expertise on Windows Security through online writing and speaking at conferences (she already checked off TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime — to name but a few). She proudly holds the role of the Security Architect in IDesign and manages her own company CQURE.

Who Is It For

Enterprise administrators

Infrastructure architects

Security professionals

Systems engineers

Network administrators

Security consultants

If you’re not sure where are you at, you can quickly

test yourself by taking Paula’s Security Quiz >>>

(If you score 13 points and above — this training is for you)

What CQURE Academy Students say

All of their classes are based on their real world experience with the products, not just the typical Official Curriculum style classes that teach you things for an exam, but that you will never use. You’ll find that all of the material you’ll learn in the class will be used, at some point, in your security career.

Jack Perry

Security Principal Consultant | Presidio

Totally professional, total great stuff, in-depth knowledge and a perfect Learning Atmosphere! I like it! Thanks so much for sharing your experience and knowledge!

Martin Weber

CTO | IT.innovation.4U GmbH

Let me start by saying Paula is amazing!! The passion for the topic really shows. As an engineer with 16 years of experience, I am impressed. Thank you for the education, and entertainment.

Dave Kordyban

Network Engineer | Garrett County Government

Once Again, What Are You Getting

forensics

  • You’ll get access to an intensive online course, divided into 5 modules (about 7 hours of video tutorials in total).
  • The syllabus covers topics like: Introduction to Incident Response and Handling, System and Network Security Mechanisms, Handling Malicious Code Incidents, Securing Monitoring Operations and Forensics Basics.
  • The course has an interactive, hands-on formula.
  • All the video recordings and extra materials are yours to keep for a full 12 months from the start of the program.

$499

Join Now!

×