Terms of attendance
CPE Credit Policy
Using Mathematics and Information Theory, write decoding software for malware network protocols.
Examine memory and disk forensic artifacts to find forensic artifacts.
Examine malicious software to discover capabilities, methods, and more.
An overview of everything. Start here if you're just getting into incident investigation!
How to manage incident response teams and communicate clearly and effectively to vested parties.
Learn the peculiarities of computers that interact with the physical environment.