SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Training 2015 - Cyber Breach Management"

Difference between revisions of "Training 2015 - Cyber Breach Management"

From BruCON 2016

Jump to: navigation, search
(Trainer Biography)
(Trainer Biography)
 
(2 intermediate revisions by the same user not shown)
Line 19: Line 19:
 
Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.
 
Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.
  
More information is available on [http://carnal0wnage.attackresearch.com/ carnal0wnage]
+
[http://www.darkreading.com/attacks-breaches/payment-card-data-theft-tips-for-small-business/a/d-id/1297277? Payment Card Data Theft: Tips For Small Business by Chris Nutt]
 
 
<br>[[Image:300px-twitter-icon.jpg|17px]] [https://twitter.com/attackresearch @attackresearch]
 
 
 
Links :  
 
* [https://www.youtube.com/watch?v=rMm6_GF_i_E (Youtube) Russ Gideon - Paint by Numbers vs. Monet (BruCON 0X05)]
 
 
 
  
 
''Mon. 5 - 7 October 2015 (09:00 - 17:00)''
 
''Mon. 5 - 7 October 2015 (09:00 - 17:00)''

Latest revision as of 20:52, 28 April 2015

Cyber Breach Management

Course Description

The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach students how to successfully manage the people, processes, and voluminous data required to successfully investigate and recover from a breach. All phases of the incident response process will be covered and hands-on exercises will provide tools for analyzing system artifacts as well as scrutinizing and communicating technical findings.

Course Contents

To be specified

Student requirements

The class is geared toward students with a background in digital forensics, computer networking or systems administration. Students should be familiar with common computing and networking terms and concepts such as file systems, RAM, DNS, active directory, IP addresses, firewalls, etc. Comfort with the Windows and Linux command line would also be beneficial.

Trainer Biography

Chris.Nutt.jpg

Chris Nutt is an expert in the field of incident response and digital forensics. He has more than 10 years of experience helping global organizations manage and conduct complex investigations into attacks targeting intellectual property and financial information.

He is a recent addition to Kroll’s Cyber Security practice, but spent the prior seven years with Mandiant, where he helped develop their investigative methodologies, digital forensics techniques, and technologies.

Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia. He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.

Payment Card Data Theft: Tips For Small Business by Chris Nutt

Mon. 5 - 7 October 2015 (09:00 - 17:00)

Register.jpg

Back to Training Overview