Select Page
Home / CPIA TRAINING

CPIA Certification Training | Virtual and Classroom

CPIA TRAINING

CPIA Training Course Basic Information

  • CPIA Training RRP is £2,495 + vat OR Click here for Todays’ offer Price
  • CPIA Training Course Duration: 35 Hours
  • 95.8% Certification Success in First Attempt
  • Classroom and Virtual batches available
  • Training delivered by Professionals
  • Dumps and Simulations available for Practice
  • Certified Trainers with enormous industry experience
  • Important Insights on Certification preparation

Book Your Course

DateLocationPriceCourse Booking
February 18-22, 2019London-Ealing£2,495 + vat
May 06-10, 2019London-Ealing£2,495 + vat
Sept 02-06, 2019London-Ealing£2,495 + vat
Dec 02-06, 2019London-Ealing£2,495 + vat

 

Prerequisites:

  • A good appreciation of the technical aspects of ICT and one year’s experience in network/server administration. Network+ and CISMP is recommended.
  • This training is intended for professionals concerned with the CREST Practitioner Intrusion Analyst and preparing for the CPIA certification exam.

CPIA Exam Information (English Language)

LENGTH OF EXAM150 Minutes
NUMBER OF QUESTIONS125
COST395 GBP
FORMATMultiple-choice, multiple-answer

CPIA Exam Information (Other* Languages)

LENGTH OF EXAM150 Minutes
NUMBER OF QUESTIONS125
COST395 GBP
FORMATMultiple-choice, multiple-answer

* French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese, Korean

 

CPIA COURSE OVERVIEW:

This course prepares the student for a career in Incident Response and provides all of the tools and teaches the techniques needed by a practicing professional. This is the first cross discipline course of its’ kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering.

This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path.

Objectves

You will learn how to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and re-construct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Quizzes and tests throughout, with feedback, re-enforce the knowledge and prepare you for the CPIA multiple choice exam.

Target Audience

  • Aspiring information security personnel who wish to be part of an incident response team
  • Existing practitioners wishing to become CREST Registered
  • System administrators who are responding to attacks
  • Incident handlers who wish to expand their knowledge into Digital Forensics
  • Government departments who wish to raise and baseline skills across all security teams
  • Law enforcement officers or detectives who want to expand their investigative skills
  • Information security managers who would like to brush up on the latest techniques and processes in order to understand information security implications
  • Anyone meeting the pre-requisites who is considering a career in Intrusion Analysis or Digital Forensics

Course Syllabus:

Soft Skills and Incident Handling

  • Engagement Lifecycle Management
  • Incident Chronology
  • Law & Compliance
  • Threat Assessment

Core Technical Skills

  • IP Protocols
  • Network Architectures
  • Common Classes of Tools
  • OS Fingerprinting
  • Application fingerprinting
  • Network Access Control Analysis
  • Cryptography
  • Applications of Cryptography
  • File System Permissions
  • Host Analysis Techniques
  • Understanding Common Data Formats

Background Information Gathering & Open Source

  • Registration Records
  • Domain Name Server (DNS)
  • Open Source Investigation and Web Enumeration
  • Extraction of Document Meta Data
  • Community Knowledge

Networking Intrusion Analysis

  • Network Traffic Capture
  • Data Sources and Network Log Sources
  • Network Configuration Security Issues
  • Unusual Protocol Behaviour
  • Encryption
  • Command and Control Channels
  • Exfiltration of Data
  • Incoming Attacks
  • Reconnaissance
  • Internal Spread and Privilege Escalation
  • False Positive Acknowledgement

Analysing Host Intrusions

  • Host-based Data Acquisition
  • Live Analysis Laboratory Setup
  • Windows File System Essentials
  • Windows File Structures
  • Application File Structures
  • Windows Registry Essentials
  • Identifying Suspect Files
  • Storage Media
  • Memory Analysis
  • Infection Vectors
  • Malware Behaviours and Anti-Forensics
  • Rootkit Identification
  • Live Malware Analysis

Reverse Engineering Malware

  • Windows Anti-Reverse Engineering
  • Functionality Identification
  • Windows NT Architecture
  • Windows API Development
  • Binary code structure
  • Cryptographic Techniques
  • Processor Architectures
  • Windows Executable File Formats
  • Hiding Techniques
  • Malware Reporting
  • Binary Obfuscation
  • Behavioural Analysis

Audience to the course:

The CPIA certification – a globally recognized professional requirement in the IT Security domain, is best suited for:

  • Professionals Interested in Obtaining the CPIA Credential
  • IT Security Professionals
  • IT Auditors
  • Managers, Directors and Executives
  • System Architects
  • Compliance Specialists
  • Risk Specialists
  • Business Analysts

Course Enquiry

Your Name *

Your Email *

Course *

Telephone *

Your Message