PRAGUE, May 17-18, 2023
Registration
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2022
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Agenda
    • Call For Speakers Prague 2023
    • Qubit conference agenda 2023
    • Speakers
    • Pre-Conference Trainings
    • Speaking Bureau
    • CPE & ECE
  • Sponsors
    • Sponsors Prague 2023
    • Sponsors details
  • Venue
  • Contact us
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2022
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Agenda
    • Call For Speakers Prague 2023
    • Qubit conference agenda 2023
    • Speakers
    • Pre-Conference Trainings
    • Speaking Bureau
    • CPE & ECE
  • Sponsors
    • Sponsors Prague 2023
    • Sponsors details
  • Venue
  • Contact us

In-person training

DIGITAL FORENSICS 101Technical training

As a cybersecurity professional, you might come across bad guys and deal with their attacks. When suspicious activity is detected, the investigation starts. It may turn to the incident response, which raises questions such as: How did the attackers breach the systems and when? What kind of malicious activity have they performed and what data have been compromised? Or there already may be another not-so-good guy in your organization /insider threat/, for example, who has exfiltrated your valuable secrets, and this activity needs to be investigated with all the consequences.

This is the time for digital forensics to help us with the investigation. It is not only about analysis, but we should also keep in mind the correct evidence collection, and data acquisition too. During the training, we will cover the whole process of digital forensics with explanations, and practical hands-on exercises and examples.

In short, the agenda includes forensic introduction, local and remote data acquisition, evidence handling, and processing. After that, be ready for data analysis focusing on the most important Windows forensic artifacts.

During our training, we will see and try several “almost free” tools such as Kape, Velociraptor, Autopsy, ELK, Volatility, etc. After that, the final CTF-style challenge will be available to practice the covered content.

PREREQUISITES:

Participants should:

  1. be familiar with Windows OS
  2. have a computer with at least 16 GB of RAM, 40 GB of free space on HDD/SSD, and installed VirtualBox (64-bit edition)
  3. Upon request, VMware images can be provided, too
  4. USB flash drives with training material will be provided during the training
Register

Trainers

Ladislav Bačo

Network Analyst| ESET

Miroslav Sidor

Security analyst| ESET

More info about training

DATE

16 May 2023
Duration: 8 hours (including lunch and 2x coffee breaks)

FORMAT

In-person training

TARGET AUDIENCE:

Cyber Security Specialists, Cyber Defense Analysts, Incident Responders, Blue Teamers, SOC Analysts, Threat Hunters

Register for training

QUBIT CONFERENCE
PRAGUE | 23

QuBit Security, s.r.o.
J. Kozáčeka 2, 960 01
Zvolen, Slovakia

info@qubitconference.com
+421 949 000 338

JOIN THE QUBIT COMMUNITY




SECURE PAYMENT
© 2013-2022 Qubit Conference, The Universe of Cyber Security - Privacy Policy - Privacy Policy in Slovak language - Terms & Conditions - Terms & Conditions in Slovak language - About cookies - O cookies