DIGITAL FORENSIC ANALYSIS
This course was designed with the aim to expand knowledge in the forensic area in which is vital for conducting investigations and clarifying an unknown situation. Through the proper handling of information and digital evidence you can get to locate a band dedicated to illegal activities (cyber crime) or find the location of common criminals.
Objectives:
- To recollect criminal evidence.
- To recover information.
- To execute a forensic analysis.
- To handle an investigation and forensic case.
Pre-requisites:
Students must have a solid foundation in computing, networks and operating systems.
Modules
- Digital evidence.
- Digital data.
- Evidence gathering.
- Data recovery.
- reverse engineering.
- Evidence analysis.
- Case presentation.
CYBERSECURITY WITHIN REACH OF EVERYONE
This course is designed to improve the levels of cyber security of all people; it is aimed at all audiences, anyone who interacts with a device, a computer, a tablet, a cell phone, etc. In this course we talk about how a cyber criminal can affect you and how to avoid being a victim.
Objectives:
- To learn different digital terminologies and concepts.
- To identify different techniques used by cyber criminals.
- Learn to detect and evade potential cyber attacks.
Modules:
- Basic concepts.
- How I protect myself online.
- My passwords.
- How I Protect my devices.
- Wireless networks.
- Cloud security.
- Social engineering.
- How I protect my family.
- Where to go?
ANALYSIS AND DETECTION OF MALWARE IN ANDROID AND IOS
This course was designed to give you first-hand knowledge of the latest malware threats on mobile devices, how do you do a proper analysis and case study? And what mechanisms can be used in the different hardware and software platforms of mobile devices which differ a little from the traditional procedure performed in computer equipment.
Objectives:
- To learn existing threats in mobile devices.
- To handle a malware case in this devices.
- To perform a Dynamic and static analysis of malware in mobile devices.
Pre-requisites:
Students must have a solid foundation in computing, networks and operating systems.
Modules:
- Bases
- Structure and processors.
- Creation of a test environment.
- Static analysis of Apps (IPA and APK).
- Dynamic analysis of Apps (IPA and APK).
- Report creation.
DETECCIÓN, MITIGACIÓN DE INTRUSIONES Y THREAT HUNTING
The “Intrusion Detection and Monitoring” course is aimed at IT professionals with experience in server, network and security administration with basic knowledge of TCP/IP networks.
After finishing the course the participants will have the necessary knowledge of the basic tools to be used to monitor a local network, detect usage patterns, abnormal behavior and potential intrusions. They will also be able to perform basic security checks on the main services available.
Objectives:
- To learn strategies for monitoring and analyzing traffic on TCP/IP networks.
- To identify objectives to be monitored in the local network.
- To learn tools for analyzing traffic data and detection of intrusions.
Modules
- Foundations.
- Network infrastructures and threats.
- Techniques and security technologies.
- Attack Detection on Networks.
- Techniques and Mitigation of Attacks on Devices.
- Threat management and hunting.
- Incident analysis and response management.
MALWARE ANALYSIS
the Malware Analyzer or Researcher career, requires a broad and sufficient level of knowledge to be able to deeply understand how systems, programs and potential dangers to which the technological infrastructure is exposed, work;
Every day new attacks come to light from the dreaded APT (Advanced Persistent Threat), software tools created by various actors (Governments, Criminals, etc.) that seek in most cases to steal information (CyberSpying), generate disinformation, etc.
The most advanced threats are often not detected by traditional protection tools (Antivirus, IDS, IPS, HIDS, etc.) so the reverser comes to play a major role in the analysis of suspicious objects.
Objective:
With this course, participants acquire the necessary skills to take a malware or application, and turn it into an understandable language to determine its action and functioning.
Pre-requisites:
- Students should have a solid foundation in Computer, Networking and Microsoft Operating Systems, Linux, Assembler.
- It is recommended to have taken the Advanced Forensics Course initially.
Modules
- Presentation
- Introduction to Malware Analysis
- Terms, definitions and framework
- Analysis of the current situation
- Analysis techniques
- Static Analysis
- Dynamic Analysis
- Memory Analysis
- ABC of APT
- APT’s performance analysis
- Botnets
- Ramsomware
- Forensic Techniques in Malware Analysis
- Tools and elements for analysis detection
- Malware Research Management