Incident Response - IR

Cyber IR

Experience in the cyber-security field


  • Candidates must have experience in the cyber-security field with a technical background in security systems, Windows, Linux and networking
  • Candidates with a background in communication systems
  • Successful completion of the Cyber Fundamentals Program


3 Weeks (216 hours) frontal course in Israel. This course is relevant for groups and not for individuals.
Frontal course in Israel
Talk to sales
For groups, fill out this form and we will contact you shortly
Incident Response - IR


More and more companies realizing the detrimental impact of internet crimes on the company’s revenue and reputation. Quick and accurate responses are vital to handle security incidents successfully. This course will train the students to provide essential answers regarding each security breach to prevent the next attempt and secure the organization’s valuable data.


After completing this course, you will have the ability to:

  • Define incident response plan
  • Investigate office files, PDF, RTF
  • Analyse emails for forensics purposes
  • Detect, analyses, and contain malware and attackers
  • Find anomalies in network traffic
  • Investigate Windows and Linux systems
  • Analyse detected malware and create an IOCs / TTP
  • Use a big-data system for SIEM, threat hunting and forensics



At the end of the course, students will have a certification test to the international organization and receive an EU certificate.


• This course is for SOC analysts seeking to enter the field of Incident Response

Discovery Program
Top Academic Experience
Two-Weeks Academic Program in Israel, Frontal Classes & Workshops.
360° Coverage
Advanced Classrooms, Hotels and Meals Are All Covered – All You Need is to Pack Your Suitcase.
Exclusive Program
Expert Lecturers and Key-Position Holders with Special Lectures and a Professional Tour Day.
Discover Israel
During the Program, You Will Enjoy Three Tour Days, Exploring the Holy Land’s Historic Sites.

Incident Response (32 hours)

  • Introduction to Incident Response
  • Emails & Attachments Analysis
  • Windows Artefacts

Network Analysis (40 hours)

  • Advanced Wireshark
  • Network Attacks & Mitigations
  • Network-based Signatures

Memory Analysis (40 hours)

  • Memory Structure
  • Memory Acquisition
  • Memory Analysis using Volatility

Basic Malware Analysis (32 hours)

  • Basic Static Analysis
  • Basic Dynamic Analysis
  • Sandboxes

Threat Hunting (32 hours)

  • Threat Hunting Concepts & Methodologies
  • Threat Hunting Across Endpoints
  • Threat Hunting in Enterprise

SOAR System (40 hours)

  • Playbooks
  • Case Management & collaboration
  • System Integration