Advanced Network Forensics & Packet Analysis
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 3 Days

This course is for Incident Response (IR) staff, but Blue Team Defenders/Hunt can also benefit from the concepts taught. Students will learn advanced network-based forensic techniques, packet analysis, and industry best practices. Rendition walks each student through network collection and malicious traffic identification, malware convert channel identification concepts, forensic network-based triage to support Incident Response, and network traffic analysis and reporting.

Advanced Penetration Testing
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 5 Days

This course is for Offensive Cyber (Red Team) operators and Enterprise Vulnerability Assessment teams, and CNO developers. Students will learn advanced penetration testing techniques and methodologies, which will expand on knowledge obtained through Rendition’s Introductory Penetration Testing course. The course culminates in a “Castle vs. Castle” practical lab where students apply knowledge using customdeveloped tools and mitigate security controls.

Basic Windows Forensics
  • Delivery: Onsite/Virtual
  • Intermediate Level Course
  • 5 Days

This course is for Incident Response (IR) staff, Blue Team Defenders/Hunt and aspiring digital forensic analysts. Students will learn introductory Windows hard disk and memory forensic techniques and industry best practices. Rendition walks each student through basic forensic collection of forensic artifacts without compromising data integrity, forensic host triage to support Incident Response, and basic host-based indicator analysis and reporting. Additionally, students will learn introductory forensic memory collection and analysis techniques, along with common malware anti-forensic countermeasures, introduction to memory analysis tool suites, and techniques to rapidly analyze memory captures.

Building an Incident Response Program/Team
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 5 Days

This course is for organizations who are looking at building an internal Incident Response (IR) Program. It provides a basic introduction to the major components of Incident Response efforts, focusing on assembling core IR team members, defining roles and responsibilities and how to manage incidents. Additionally, provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.

Defensive Security Program Development
  • Delivery: Onsite/Virtual
  • Intermediate Level Course
  • 3 Days

This course is for information security practitioners who are looking at enhancing their organization’s overall information security posture and maturity. This course is focused on reviewing and learning how to leverage critical security control standards within our organization. Learn how the practical application of layering these critical security controls reduce risk to your organization, increases the security posture, mitigates technical vulnerabilities, and demonstrates the value information security brings to the business.

Exploit Development
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 5 Days

This advanced course is for Offensive Cyber (Red Team) operators and Enterprise Vulnerability Assessment teams and CNO developers. Students will learn exploit fuzzing techniques, exploit writing, exploit development, and exploit weaponization techniques targeting Windows, Linux/UNIX, Embedded devices, and Web Application vulnerabilities.

In-Depth Code Injection
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 4 Days

This course is for incident responders, forensic investigators, and Red Team members as well as those that desire some malware reversing experience. Students will learn the programming interfaces that make code injection happen. For each technique, there will be examinations of how it works, what endpoint solutions stop it, and the forensic artifacts left behind. This is an intermediate to advanced course. Programming, reversing, assembly, and debugging experience is helpful but not required.

Information Security Management
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 4 Days

This course is for seasoned information security practitioners who are considering transitioning into a management role. Learn how to manage and adapt technology to your organization and industry. This course focuses on the relationship between an information security program and the organization’s business goals and objectives. Learn to identify critical issues and customize organization specific practices to support the governance of information security and related technologies. The course covers information security governance, information risk management, information security program development & management, and information security incident management.

Introduction to Forensics Host, Network, Memory, Web
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 5 Days

This course is for Incident Response (IR) staff, Blue Team Defenders/Hunt, or aspiring digital forensic analysts. Students will learn introductory host-based, network, memory, and web collection and forensic analysis techniques and industry best practices. Rendition walks each student through basic forensic collection of forensic artifacts without compromising data integrity, forensic triage to support Incident Response, and basic indicator analysis and reporting.

Introduction to Penetration Testing
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 5 Days

This course is for Offensive Cyber (Red Team) operators and Enterprise Vulnerability Assessment teams and CNO developers. Students will learn foundational knowledge of penetration testing and how to configure tools and virtual lab environments. The specific areas include external, internal, web application, wireless and physical penetration testing. The course culminates in a “Castle vs. Castle” practical lab where students apply knowledge.

Introduction to Phishing, Campaign Design, & Deployment
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 3 Days

This course provides foundational knowledge for Security Operations staff, Offensive Cyber (Red Team) operators, and Enterprise Vulnerability Assessment teams. Students will learn how to plan, implement, engage, and report on phishing campaigns they conduct. Starting with the basics and working up to post-engagement reporting, students will be equipped with the practical knowledge necessary to enact and report on internally sources phishing campaigns that will test end users and effectiveness of phishing-awareness training initiatives.

MalCare
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 10 Days

This course is for Security Operations staff and Blue Team Defenders. This is a deep-dive into the concepts and practices around reverse engineering malicious software. This is an intense 10-day course contains over 30 practical labs and with the goal on practical application of reverse engineering malicious software to better understand threat actors and to protect our organizations.

MalCare+
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 15 Days

Rendition had a feeling that someone would try to remove the styles from this blurb. That is why we handled this feature in the backend. With that being said, it appears that you do know a little about computers, why don’t you head over to https://renditioninfosec.com/opportunity and attempt one of the challenges. You never know, you might like the challenge and want to come join our team!

Network Security Monitoring & Analysis
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 5 Days

This course is for Security Operations staff and Blue Team Defenders. This is an abbreviated Security Operations – Network course that focuses on Network Security Monitoring & Analysis. Students will learn monitoring concepts and design, how to utilize built-in OS tools to perform monitoring, and network security monitoring workflow development. Students will learn how to effectively analyze network traffic and turn it into actionable defense countermeasures and reporting.

Offensive Security Program Development
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 3 Days

This course is for Red Team management and operators. Developing and implementing an effective Offensive Security Program can be quite a task. This course will prepare students to design, lead, and implement an Offensive Security program from foundational concepts to effective vulnerability management and offensive operations.

Physical Penetration Testing
  • Delivery: Onsite/Virtual
  • Advanced Level Course
  • 3 Days

This course is for Offensive Cyber (Red Team) operators and Enterprise Vulnerability Assessment teams and CNO developers. Students will learn foundational and advanced physical penetration testing techniques and methodologies. Learn how to go from physically scoping out a building to breaking in. In this course, you will learn physical reconnaissance, surveillance, tradecraft, lock picking, and physical security bypass techniques.

SOC Building & Management
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 3 Days

This course is for those organizations that are looking at building out their information security capabilities and develop their own internal information security training program. The course focuses on concepts and principles to consider when you are building your staff resource planning requirements and how to demonstrate business value in the process.

Threat Intelligence Operator
  • Entry Level Course
  • 5 Days

This is an introductory course that provides summary information around core threat intelligence program areas. The domains cover of data collection, data processing, information analysis, and production of a threat intelligence product for internal consumption within the organization. Additionally, students will learn how to identify indicators of compromise and reliably leverage threat actors’ tactics, techniques and procedures in containment and eradication during an incident or integrate threat intelligence efforts into the organizations Incident Response program.

Threat Intelligence Program Development & Management Workshop
  • Delivery: Onsite/Virtual
  • Entry Level Course
  • 5 Days

This course is for organizations and managers that want to grow and mature their threat intelligence programs. The focus is given on understanding what makes a business valued threat intelligence program that addresses not only technical skills and instrumentation but also governance and oversight and how to demonstrate business value to the organization. Students will gain understanding in the areas of planning, production, dissemination, and recommending actions within the organization. The course will cover threat intelligence efforts in context of business operations, risk management, incident response, disaster recovery, policy development, and security operations.

World Class Instructors

Rendition’s instructors are of the highest quality and have taught students virtually and on-site on almost every continent.

Rendition offers virtual and in-house training tailored to your environment. Please contact us for customizable training solutions.

Your cart
subtotal:
$0.00

This will be copy area - something to the effect of estimated ship time if applicable

CONFIDENTIAL

Rendition's advanced courses contain the latest in information security knowledge. Please contact us for more information.

This page has proprietary information in it, please contact us for more information.