Skip to content
SKU: M2-CS

$1,950.00

The Cyber Shield course was originally designed for the Ohio National Guard. It is a vendor neutral cyber security course focusing on the acquisition and collection of evidence, forensic analysis, malware analysis and report writing.

Select a date below

Categories:

Dates are listed in Pacific Time Zone

= Guaranteed to run date

Description

Print Friendly, PDF & Email

Overview:

The Cyber Shield course is a proprietary course developed by Mile2 to provide military and government personnel the forensic skills needed to engage in detection, prevention and recovery tactics within cyber space.

The Cyber Shield course was originally designed for the Ohio National Guard. It is a vendor neutral cyber security course focusing on the acquisition and collection of evidence, forensic analysis, malware analysis and report writing.

The Cyber Shield course training entails¬† hands on labs in Mile2’s proprietary cyber range. Each lab designated teaches the methodology for conducting a computer forensic examination, an incident/event and general network forensic scenarios. Students will learn to use industry acceptable and forensically sound investigative techniques in order to, evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a finding/executive report.

This specialized course covers topics from Mile2’s CDFE, CNFE, CCSA courses which are all a part of the Master Forensic Investigator line of study.

Prerequisite(s):

12 months in Internet Technology or 12 months in Information Security

Audience:

  • Army National Guard
  • Network Defense
  • Cyber Protection Team
  • Security Officers
  • IS Managers
  • State Agents
  • IT Managers
  • ISO

Outline:

Module 1: Forensics Process/Threat Management

Module 2: Digital Acquisition

Module 3: General Artifact Analysis

Module 4: Malware Analysis

Module 5: Digital Forensic Reporting

Labs

  • Lab 1: Chain of Custody
  • Lab 2: Identify Seized Evidences
  • Lab 3: Assessing Current Defense State
  • Lab 4: Upgrading Detection Capabilities
  • Lab 5: Devices Acquisition
  • Lab 6: Digital Forensics
  • Lab 7: Traffic Analysis
  • Lab 8: Prepare the Case Evidence (1st Evidence)
  • Lab 9: Investigate Acquired Evidence
  • Lab 10: Prepare the Case Evidence (2nd Evidence)
  • Lab 11: Finding Clues
  • Lab 12: Malware Analysis
  • Lab 13: Stuxnet Trogen
  • Lab 14: Incident Response

 

Additional information

Length

3 days

Guaranteed to run

No