Listing Thumbnail

    Incident Response Training - Check Point Security

     Info
    Sold by: CLICO 
    UNIQUE BENEFITS FOR TRAINING PARTICIPANTS: Participants will engage with real- -world attack techniques encounte- red in actual cybercriminal activities. They will also gain access to specia- lized cybersecurity systems, inclu- ding a Next-Generation Firewall with comprehensive security features and Endpoint Detection and Response (EDR) with live forensics capabilities (also with protection of AWS resources to showcase cloud attack examples). These tools will allow participants to observe how effectively specific cybe- rattack techniques can be detected using advanced security tools. The skills acquired during this training will significantly enhance participants’ ability to detect and respond to real- -world cyberattacks at an early stage.

    Overview

    Training objective:

    To effectively manage cybersecurity in organizations, profes- sionals need a thorough understanding of how cybercrimi- nals operate, as well as the ability to utilize available tools and security solutions to analyze incidents and respond appropria- tely. This training is designed to provide IT staff and SOC operators with hands-on experience, enabling them to analyze real-world cyberattacks, assess situations, and respond to incidents effectively.

    Practical exercises:

    The training includes practical exercises conducted in a dedicated training environment equipped with Check Point security solutions (NGFW, EDR) and individual participant workstations running Kali Linux with the Cyber Soldier Project application. The environment also includes various Web/SMB servers and an Active Directory setup to simulate real-world cyberattacks. Participants will apply techniques commonly used in actual cyberattacks, following the MITRE ATT&CK framework. These techniques include, but are not limited to: OS Credential Dumping: LSASS Memory / Security Account Manager, Web Shell, Exploitation for Privilege Escalation, Lateral Tool Transfer, Pass the Hash and Exploitation of Remote Services, attack paths on misconfigured AWS infrastructure (EKS, Lambda, S3 Buckets, SSRF etc.).

    Target Audience

    SOC engineers and managers, security consultants , IT Staff

    Form of delivery • Instructor-Led Training (ILT) (in a classroom) • Virtual Instructor-Led Training (VILT) (online) • HYBRID (mix of ILT/VILT)

    The offer is available only for CEE region.

    Highlights

    • Since 2001, ATC CLICO has been consistently delivering top-quality authorized and proprietary training courses for IT professionals in Poland and across Central and Eastern Europe.

    Details

    Sold by

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Resources

    Vendor resources

    Support

    Vendor support

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer-