At Venor we have a strong belief in hands-on experience and deep understanding of the technical details. Our trainings are aimed for technical staff who will be or are working with security and need a deep technical understanding of the work tasks assigned to them. Hence we provide trainings with practical hands-on exercises from real life scenarios and deep level explanations on how and why.
Often you are tasked with performing a forensic investigation during periods when time is short and stakes are high. Perhaps one or more assets has been compromised or an employee is suspected of stealing or exfiltrating data. Your response needs to be swift and accurate to minimize the impact and draw the right conclusions. In our Digital Forensics and Incident Response trainings we discuss everything from chain of custody, artifact acquisition, artifact analysis, malware techniques, proof of execution and activity investigations.
You'll learn how to respond to incidents who are of different nature, dig out solid evidence to what happened, procedures and documentation needed as well as other best practices in hands on exercises.
We are offering trainings from entry level analysts who are looking to start their career in DFIR up to advanced topics for senior analysts who are looking to increase the depth of their skills new forensic areas.
Malware are often a part of security incidents and it is getting increasingly important to answer questions such as what the malware does, how can we identify additional victims, and how can we still analyze the malware while it is defending itself. Being able to perform malware analysis can be the difference in an incident response case where the malware keeps re-appearing despite your best efforts and the adversary stays within your network.
In this training you will be analyzing real malware with various techniques, beat their defenses and extract indicator of compromise to perform sweeps across a fleet of devices to detect further victims in a series of hands on labs.
We recommend this training for experienced security analysts with a good understanding of the Windows operating system.
Detecting threats in modern networks can be challenging with DevOps team constantly deploying or large organizations without centralized control. Encrypted traffic, zero trust implementations and lack of automatic log analysis are quite often parts of the daily job for many security teams.
In our series of security monitoring trainings you will be learning how to detect threats on various platforms using various techniques as well as how to effectively operate a Security Operations Center. We will discuss and perform labs on topics such as endpoint monitoring, log analysis and network threat detection.
This series of trainings is well suited for entry level analysts who are looking to start their career in a SOC up to senior analysts who are interested in learning about detecting threats using new technologies and methods.