Lunesys’ Computer Security Incident Response Training

Without a doubt, the sophistication and threats caused by malicious attacks have continued to increase at a rapid level. If you plan on responding to a security incident, you must be able to meet the challenges that these sophisticated attackers present. LuneSys helps you meet the challenges presented by attackers in this hands-on Incident Response class. You will learn effective detection, response, and remediation strategies that will enable you and your organization to properly contain a security incident. This five day class has been specifically designed for technical information technology professionals, targeted at technical responders, who respond to computer security incidents. In this course, you will go over many real-world case studies, and gain the skills you need to respond to incidents via hands-on lab exercises.

A sample of the topics covered in this class are:

  • Understanding the methodology of an effective Incident Response process
  • Incident Response Phases
  • Create working documentation and checklists usable during a real-world response crisis
  • Understand the proper incident response process for live compromised Windows and Unix systems
  • Learn how to detect and confirm attacks against Windows and Unix systems
  • Create a system response toolkit to be used in the heat of a crisis
  • Learn how to discover attack signatures in Windows and Unix log files
  • Use Log Parser 2.2 to recover critical information from Windows systems
  • Understand what volatile evidence is present on a system you must collect and preserver prior to system power down
  • Get hands-on experience retrieving and writing to disk memory from suspicious processes
  • Detect and remove Win32 Rootkits, LKM Rootkits and Trojaned files
  • Discover hidden files files and processes
  • Analyze and export data from critical system files in Windows including hiberfil.sys and pagefile.sys
  • Learn how to recover deleted or overwritten files from Kernel memory on Unix systems
  • Perform basic Reverse Engineering of unknown process and binaries, without having to know assembly language.

Lunesys’ Other Training Workshops

Ethical Hacking

Ethical Hacking / Penetration Testing Training Workshop

Penetration Testing

The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy

Computer Forensics Investigator

The incident was not the end of the world. We can backtrack!

Learn to uncover and interprete electronic data

How to conduct forensically sound computer examinations with forensic recovery techniques

CISSP Boot Camp

Credential demonstrates that an IT professional understands full range of security for the automated information system.

Certified Information System Security Professional (CISSP)

Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.

Enterprise Security Awareness for IT Users

Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.

A Must-Have Training for Every IT User of your Organization

LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.

Why Choose Lunesys

      • We are not a jack-of-all-trades involved in every sort of business and training;
      • We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
      • We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
      • We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
      • The most reasonable price is another advantage we offer;
      • Our previous clients’ great satisfaction and highly-rating testimonials are our honor.