Prihlásenie

 
 
Produkt je vyradený!  Produkt už nie je v našej ponuke.
Kontaktujte, prosím, manažéra produktu:

Petra Lukáčová
[email protected]
 
 
 
 
 

 

Computer Security Forensics and System Recovery

 
 
 
 
 
 
 
  • Computer Security Forensics and System Recovery

 Na objednávku 

 
 
 
 
 
 
 
 
Kód:
SKSUN SC-410
Part No.:
SC-410
Výrobca:

ORACLE

 
 
 
 
 
 
 
 
 
 
 
 
 
 
  •  
  •  
 

Podrobnosti o produkte

 
 
 

Popis produktu:

Na tento kurz nie je vypísaný najbližší termín konania. V prípade záujmu kontaktujte prosím Sun Training managera - Ing. Petru Lukáčovú na adrese [email protected], ktorá Vám ochotne odpovie na všetky otázky.

Miesto konania: ASBIS SK, s.r.o.

Dĺžka trvania kurzu: 4 dni


Popis kurzu:

The Computer Security Forensics & System Recovery course provides industry professionals with the knowledge and advanced technical skills necessary to perform a forensic investigation on Solaris 9 Operating Systems (Solaris 9 OS). This course equips students with the data collection, data preservation, and analytical skills necessary to investigate potentially compromised systems, knowledge of common attacks, and preparation for working with a legal investigation.
System recovery and hardening is covered from the perspective of the role of the systems administrator in enabling the site to resume operations in a potentially hostile environment.
The primary focus of this course is technical analysis, but it peripherally includes general aspects of legal procedure not specific to any particular jurisdiction, but following industry best-practices. This includes appropriate evidence-gathering techniques, securing an incident scene, maintaining chain of custody, documentation of forensic analysis, and preparation to respond to security intrusions in adherence to local incident response policies and procedures. Recent legislation in the United States, such as the Sarbanes-Oxley Act, Health Insurance Portability and Accounting Act (HIPAA), and Gramm-Leach Bliley Act, mandates internet technology (IT) security control policies and procedures take legal issues into account for certain industries. This can affect how a forensic investigation proceeds by requiring that law enforcement be informed of certain security breaches.
This course includes real-world exercises that provide hands-on experience in computer forensic analysis.


Tí, ktorí absolvujú tento kurz sa naučia:

-Describe the roles of forensic investigators and outline the computer forensic process
-Identify elements of Incident Response policies and procedures that effect the computer forensic process
-Describe indicators of a system compromise and intrusion response tasks
-Use forensic tools and commands to gather evidence without damaging it
-Describe how evidence is collected and secured with integrity certified
-Restore a compromised system to operation and identify additional security measures to protect against repeat attacks
-Understand methods and motivations of attackers
-Describe the features of a forensic system
-Use file timestamps to assist in computer forensic analysis
-Use native Solaris OS tools and third-party tools, such as The Coroner's Toolkit, for forensic analysis


Požadované vstupné znalosti:
Install and configure a Solaris OS system
Perform system administration functions, such as backups, restores, user account management, and file system management.
Perform network administration functions, such as tracing networking connections, network routes, and configuring network services.

Pre koho je kurz určený:
Students who can benefit from this course include IT professionals who are required to perform technical analysis of Solaris OS Systems for potential legal proceedings. This includes systems administrators, law enforcement investigators, and technical support engineers. The techniques are also beneficial to those who might not be seeking legal action, but want greater understanding of tools and techniques for analyzing Solaris OS systems. This includes system administrators and systems programmers who might utilize these techniques for system and software debugging.

Odporúčané predcházajúce absolvovanie kurzov:
Administering Security on the Solaris Operating System (SC-300)
Solaris Operating System Network Intrusion Detection (SC-345)





Technické špecifikácie sa môžu meniť bez predošlého upozornenia. Obsah aktuálneho balenia sa môže líšiť v závislosti od dátumu predaja. Obrázky majú len informatívny charakter.

 
 
 
 
 
 
 

Súvisiace dokumenty

 
 
 
učebné osnovy:  UO_SC-410.pdf
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Pobočka Bratislava

Tuhovská 33

831 06 Bratislava

Pondelok - Piatok:

od 8.30 do 17.00 hod.

E-mail: online_kontakt[at]asbis.sk

Recepcia: + 421 2 321 65 111

Obchodné oddelenie: + 421 2 321 65 777

maps
Pobočka ASBIS Košice

Moldavská cesta 8/B

040 11 Košice

Pondelok - Piatok:

od 8.30 do 17.00 hod.

E-mail: online_kontakt[at]asbis.sk

Recepcia: + 421 55 321 65 11

maps
 
 
 
 
 
 
 

 

 

Obchodné oddelenie

+421 2 321 65 777

Zobraziť klasickú verziu

Prevádzkuje ASBIS SK spol. s r.o.

Technické riešenie © 2025 CyberSoft s.r.o.