(+1) 418-261-7460
20 Rue St-Nicolas, Québec, QC, G1K 6T2, Canada
info@captosec.com
CAPTOSEC, Inc.CAPTOSEC, Inc.

Incident response and investigation

  • Home
  • Incident response and investigation

Incident response and investigation

Targeted training to meet persistent needs

If you're looking for new challenges in IT security and you're having trouble convincing employers, or if you want to change field or function within your organisation and end up in cybersecurity, we've got just the job for you.

At CAPTOSEC, Inc., we are making a major contribution to reducing the shortage of cybersecurity workers in Quebec, Canada and elsewhere in the world.

Duration

42 hours

On-line

and classroom-based

In video

Self-assessment

Practical exercises and simulations

Prerequisites

IT security
37%
Network
43%
Linux
25%
Windows
25%

Objective

Prepare participants to design, develop and implement a security incident response plan

Targets and opportunities

Our training courses are aimed at new arrivals or students at the end of their training, with an IT profile, as well as employees looking to change careers.
On completion of the course, you will be able to work as:

  • Cybersecurity analyst - SOC
  • Intrusion testing specialist
  • Intrusion detection analyst
  • Security incident response specialist

On behalf of any organisation, including the civil service

Process and advantages

Our experts have designed the courses based on proven learning methods:

  • Classroom-based and online training
  • Practical exercises and simulations
  • Demonstrations
  • Laboratories and workshops
  • Scenarios
  • Group discussions
  • Self-evaluations

Flexible timetables to suit your needs, with the option of fast-track training over 2 or 5 days.
A fully-equipped training room (laptops, servers, video projector, etc.).

Tools and methodology

Laptop, SANS SIFT, REMnux, Sysinternal, Online support.

Skills acquired

  • Steps in carrying out an intrusion and vulnerability test
  • Intrusion testing methodology
  • The different types of cyber security attack
  • Analysis of vulnerability scanning results
  • Installing and configuring Kali linux
  • Installing and configuring OpenVAS
  • Identifying and exploiting vulnerabilities
  • Drafting of test reports

Syllabus

Available after registration

Contact us

Besoin de plus d’information? Exprimez vous

en_USEN
Cookie Consent Banner by Real Cookie Banner