{"id":137,"date":"2016-02-26T09:21:05","date_gmt":"2016-02-26T17:21:05","guid":{"rendered":"http:\/\/iacis.com\/?page_id=137"},"modified":"2025-04-05T12:48:38","modified_gmt":"2025-04-05T16:48:38","slug":"cyber-incident-forensics-response","status":"publish","type":"page","link":"https:\/\/allprowebworks.dev\/_iacis\/training\/cyber-incident-forensics-response\/","title":{"rendered":"CIFR: Cyber Incident Forensic Response"},"content":{"rendered":"<p style=\"font-weight: 400;\">The concept of the IACIS intrusion investigation training class was born when one of the instructors retired from law enforcement and started working Incident Response consulting.\u00a0 He quickly realized that there were gaps in his forensic knowledge that hindered his ability to quickly and accurately support corporate clients who were victims of a cyber intrusion (\u201cimaging a shutdown Windows system is easy, but what\u2019s ESXi and how do I get an image out of it?\u201d).\u00a0 These gaps were further highlighted when LE peers asked for advice or recommendations for training or skill development. A list of primary functional skills was developed and provided to peers wanting to update or improve their skills in the IR arena. Unfortunately, there wasn\u2019t any single class that covered most of these skills, much less all of them.\u00a0 So, it was decided to develop a one-week class, which quickly turned into a two-week class that focused on providing investigative functionality in most of these skill areas.\u00a0 This class became the IACIS Cyber Incident Forensic Response (CIFR) class, which focuses on teaching the combined lists of investigation concepts.\u00a0 While the class doesn\u2019t make a student an expert in all these areas, the level of training is deep and broad enough so the student understands the concepts and processes and can competently apply them to an investigation.\u00a0 The intent is to provide \u201ca 12-inch deep and a mile wide\u201d approach to a broad range of investigation skills, vs. having to spend many thousands of dollars for 5 days on an \u201cinch wide and an unnecessary mile deep\u201d single topic, then many thousands of dollars for 5 days on yet another single topic.<\/p>\n<p style=\"font-weight: 400;\">CIFR uses a real network environment in the classroom to simulate a corporate network, integrating actual network and domain architecture into the instruction to increase realism. Students interact with Windows and Linux VMs in the class and are shown how their actions are presented at the local, domain, and SIEM logging levels. The class has a large number of labs, based on a belief the student learns better by doing the task vs reading about the task in bullets on a slide presentation.<\/p>\n<p style=\"font-weight: 400;\">The typical class attendees include:<\/p>\n<ul>\n<li>LE conducting or supporting intrusion investigations<\/li>\n<li>LE who have completed many other classes and are looking for something to grow their skillset<\/li>\n<li>Corporate IT security<\/li>\n<li>Corporate IT admins<\/li>\n<li>Academia<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Throughout the 2- week class, students will cover topics and lab exercises that include:<\/p>\n<ul>\n<li>RDP<\/li>\n<li>Join a domain<\/li>\n<li>Create Group Policies (GPOs)<\/li>\n<li>Use net.exe commands in intrusion processes<\/li>\n<li>SSH<\/li>\n<li>dd image using netcat<\/li>\n<li>dd image using ssh<\/li>\n<li>Log analysis with Linux command line<\/li>\n<li>Remote analysis and acquisition with FEX<\/li>\n<li>Analysis of network captures with Wireshark<\/li>\n<li>Generation and use of timelines<\/li>\n<li>Analysis of website defacement incident<\/li>\n<li>Analysis of ssh server compromise incident<\/li>\n<li>Analysis of compromised Windows and Linux images<\/li>\n<li>RAM capture and analysis<\/li>\n<li>Static and dynamic malware analysis<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The first week ends with two log analysis labs drawn from real-world incidents.<\/p>\n<p style=\"font-weight: 400;\">The second week ends with the students witnessing an attack, with a walkthrough of the attack process and the resulting intrusion or malware artifacts.\u00a0 Students then acquire RAM and a system image across the classroom network and spend Friday analyzing the RAM, image, and malware from the attack. <a href=\"https:\/\/allprowebworks.dev\/_iacis\/wp-content\/uploads\/2024\/06\/IACIS-CIFR-Class-Schedule.pdf\" target=\"_blank\" rel=\"noopener\">Click here to view Schedule<\/a><\/p>\n<p style=\"font-weight: 400;\"><strong><u>WHEN<\/u><\/strong><strong>:\u00a0\u00a0April 28 &#8211; May 9, 2025<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong><u>COST<\/u><\/strong><strong>: $3,695.00 US Dollars <\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong><u>EQUIPMENT<\/u><\/strong><strong>: Classroom laptops will be given to the students to take home and keep. <\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong><span class=\"s2\"><a href=\"https:\/\/allprowebworks.dev\/_iacis\/wp-content\/uploads\/2024\/10\/CIFR-Course-Schedule.pdf\"><span class=\"s3\">COURSE SCHEDULE<\/span><\/a><\/span><\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong><span class=\"s2\"><a href=\"https:\/\/allprowebworks.dev\/_iacis\/wp-content\/uploads\/2024\/10\/CIFR-Core-Competencies.pdf\"><span class=\"s3\">CORE COMPETENCIES<\/span><\/a><\/span><\/strong><\/p>\n<p><span style=\"text-decoration: underline;\"><b>REGISTRATION<\/b><\/span><b><span data-contrast=\"auto\">: <span style=\"color: #ff0000;\">NOW OPEN<br \/>\n<\/span><\/span><\/b><span data-contrast=\"auto\">Existing IACIS members, simply log in with your credentials and go to the <span class=\"s2\"><a href=\"https:\/\/members.iacis.com\/training\"><span class=\"s3\">Products<\/span><\/a> page<\/span> to purchase and register for the course.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For non-IACIS members, the m<span class=\"s2\">embership fee is waived with the purchase of the training course; however, to register for the course you must complete a membership application at the time of purchase. Purchase training course <a href=\"https:\/\/members.iacis.com\/training\"><span class=\"s3\">HERE<\/span><\/a>.<\/span><\/span><\/p>\n<p><!--\n\n\n<p style=\"font-weight: 400;\">***IMPORTANT*** Regarding IACIS\u2019s upcoming 2025 AADF Training, please note that payment must be received NO LATER than 45 days prior the first day of class, by March 12th, 2025. Failure to meet this deadline will result in the forfeiture of your reserved seat, which will be made available to other interested registrants. This policy is strictly enforced, with NO EXCEPTIONS.<\/p>\n\n\n\n\n\n<p style=\"font-weight: 400;\">While we do accept purchase orders, full payment is expected by the March 12th deadline. As IACIS makes advance purchases of all necessary equipment and materials, ensuring that all seats are confirmed is essential to our training courses.<\/p>\n\n\n\n\n\n<p style=\"font-weight: 400;\">To assist in this process, we kindly request that you inform your finance department of the March 12th payment deadline to prevent any issues that could jeopardize your participation in IACIS\u2019s training. \u00a0Please make sure you have all the appropriate paperwork turned in and in a timely manner to facilitate a smooth and prompt transfer of the payment for your training.\u00a0 If you have any questions or concerns, please contact our Treasurer at <a href=\"mailto:treasurer@iacis.com\" data-outlook-id=\"67c3f814-700e-4d54-beba-325e32b02660\">treasurer@iacis.com<\/a>.<\/p>\n\n\n--><\/p>\n<p style=\"font-weight: 400;\"><strong>Registration is still open, however, payment is expected at the time you register.  If you need to make other arrangements, please contact <a href=\"mailto:Debbie.plamondon@iacis.com\">Debbie.plamondon@iacis.com<\/a>.  Thank you for your cooperation.  We appreciate it.<\/strong><\/p>\n<p><span data-contrast=\"auto\">Cancellations within 45 days from the start of class to 31 days from the start of class will be subject to a $150 cancellation fee. There will be no refunds within 30 days from the start of class.****<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"font-weight: 400;\"><strong>* On-Site Check-in Times (student pickup of equipment, ID card, IACIS info) are:<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0Sunday, April 27, 2025: 1800 \u2013 2000<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Monday, April 28, 2025: 0700 \u2013 0800<\/strong><\/p>\n<p style=\"font-weight: 400;\">* Please make arrangements to arrive in time to check-in so that you may be in class promptly on the first day.<\/p>\n<p style=\"font-weight: 400;\"><strong><u>COURSE NOTES<\/u><\/strong><strong>:<\/strong><\/p>\n<p style=\"font-weight: 400;\">Please read the following notes regarding this class:<\/p>\n<ol style=\"font-weight: 400;\">\n<li>Classes begin at 8:00 AM ET and conclude at 5:00 PM ET each day, with a one-hour lunch break. <strong>Classes will end at 4:00 PM ET on the last day of class. Please do not arrange for departing flights prior to 7:00 PM ET to allow time for travel to the airport and any security clearances.<\/strong><\/li>\n<li><strong>The dress code for the conference is business casual (collared shirts and slacks).<\/strong> The wearing of shorts, flip-flops, tank tops, etc., is not allowed in the classroom. <strong>Personal computers are not permitted in the classroom. <\/strong>Students are required to attend all classes to successfully complete the program. Students who fail to meet the attendance requirements will not be issued a certificate at the conclusion of the program.<\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">HOTEL BOOKING<\/span><\/b><b><span data-contrast=\"auto\">:\u00a0<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">The course will be taught at the <\/span><a href=\"https:\/\/allprowebworks.dev\/_iacis\/training\/caribe-royale-orlando\/\"><span data-contrast=\"auto\">Caribe Royale Orlando<\/span><\/a><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">8101 World Center Drive, Orlando, Florida 32821 (USA).<\/span><\/b><span data-contrast=\"auto\">\u202f This hotel is 16 miles from the Orlando International Airport, it has a large pool, spacious workout facility and is close to Disney World and Universal Studios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Book via the Caribe Royale Orlando site <a href=\"https:\/\/allprowebworks.dev\/_iacis\/training\/hotel-booking\/\">here<\/a>.<\/span><span style=\"color: #ff0000;\"><b>\u00a0<\/b><\/span><span data-contrast=\"auto\">If you choose to stay at a different hotel and commute to the conference, you may be subject to parking fees per conference center policy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Or book via phone by calling the following numbers:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"font-weight: 400;\"><strong>Reservations Toll-Free: 1-800-823-8300\/1-888-258-7501 or the local number 407-238-8000.<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong><u>CANCELLATION INFO<\/u><\/strong><strong>: <\/strong>If IACIS is unable to hold the Orlando training event, then all students who have registered and paid will have the option of a full refund or a reserved seat at next year\u2019s training event.\u00a0 IACIS is not responsible for any outside expenses (e.g., travel and accommodation) in the event of the training event being canceled.\u00a0 Anyone who paid for training will receive complimentary membership through the year that his\/her training takes place.<\/p>\n<p style=\"font-weight: 400;\">\n","protected":false},"excerpt":{"rendered":"<p>The concept of the IACIS intrusion investigation training class was born when one of the instructors retired from law enforcement and started working Incident Response consulting.\u00a0 He quickly realized that there were gaps in his forensic knowledge that hindered his ability to quickly and accurately support corporate clients who were [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":61,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-right-sidebar.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-137","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/comments?post=137"}],"version-history":[{"count":69,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/137\/revisions"}],"predecessor-version":[{"id":4636,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/137\/revisions\/4636"}],"up":[{"embeddable":true,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/61"}],"wp:attachment":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/media?parent=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}