Cyber Emergency Response Team (CERT) Training Course
This course explores the management of an incident response team, focusing on the role of the first responder. Given the increasing frequency and complexity of today's cyber attacks, incident response is a crucial function for organizations.
Incident response serves as the final line of defense. Detecting and responding to incidents efficiently requires robust management processes. Managing an incident response team demands specialized skills and knowledge.
This course is available as onsite live training in Taiwan or online live training.Course Outline
- Know what is the first responder role
- Know how to detect, identify and analyze the incident
- Understand the basics of Incident handling and management
- Understand how to Build and manage CERT
- Know Cyber Crisis & Communications Planning
- Understand the concept of Incident Response
Requirements
Basics of Information security management
Work experience in an IT or IT-related role
Open Training Courses require 5+ participants.
Cyber Emergency Response Team (CERT) Training Course - Booking
Cyber Emergency Response Team (CERT) Training Course - Enquiry
Cyber Emergency Response Team (CERT) - Consultancy Enquiry
Testimonials (4)
It was clear and with very good examples
Carlo Beccia - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security vulnerabilities in software, websites, or systems and reporting them responsibly to earn rewards or recognition.
This instructor-led, live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the basics of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Grasp the fundamental concepts of vulnerability discovery and bug bounty programs.
- Utilize essential tools like Burp Suite and browser developer tools for application testing.
- Recognize common web security issues such as XSS, SQLi, and CSRF.
- Submit clear and actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course tailored to your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation delves into high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led, live training (available online or onsite) is designed for intermediate to advanced security researchers, penetration testers, and bug bounty hunters who want to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
By the end of this training, participants will be able to:
- Automate the process of reconnaissance and scanning for multiple targets.
- Utilize cutting-edge tools and scripts commonly used in bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scans.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Format of the Course
- Interactive lectures and discussions.
- Hands-on experience with advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and sophisticated attack chains.
Course Customization Options
- To request a customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe Certified Digital Forensics Examiner vendor-neutral certification is designed to train professionals in cyber crime and fraud investigation. This course equips students with the skills needed for electronic discovery and advanced investigative techniques, making it essential for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training program teaches a systematic approach to conducting computer forensic examinations. Students will learn to apply forensically sound methods to assess the scene, collect and document relevant information, interview key personnel, maintain the chain of custody, and prepare comprehensive findings reports.
This course is beneficial for organizations, individuals, government offices, and law enforcement agencies that need to pursue litigation, establish proof of guilt, or take corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course offers a structured methodology for effectively and efficiently managing and responding to cybersecurity incidents.
This instructor-led, live training (available online or onsite) is designed for intermediate-level IT security professionals who aim to develop the tactical skills and knowledge required to plan, classify, contain, and manage security incidents.
By the end of this training, participants will be able to:
- Comprehend the incident response lifecycle and its various stages.
- Implement procedures for detecting, classifying, and notifying about incidents.
- Effectively apply strategies for containment, eradication, and recovery.
- Create post-incident reports and plans for continuous improvement.
Format of the Course
- Interactive lectures and discussions.
- Practical application of incident handling procedures in simulated scenarios.
- Guided exercises focused on detection, containment, and response workflows.
Course Customization Options
- To tailor the training to your organization's specific incident response procedures or tools, please contact us to arrange a customized session.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Taiwan (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Digital Investigations - Advanced
21 HoursIn this course, you will delve into the principles and techniques of digital forensics investigations and explore a wide range of available computer forensics tools. You will gain an understanding of core forensic procedures to ensure that evidence is admissible in court, as well as the legal and ethical implications involved.
You will also learn how to conduct forensic investigations on both Unix/Linux and Windows systems, covering various file systems. The course includes advanced topics such as wireless, network, web, database, and mobile crime investigations.
Ethical Hacker
35 HoursThis course will immerse students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. The lab-intensive setting provides each student with comprehensive knowledge and practical experience with essential security systems currently in use. Students will start by understanding the workings of perimeter defenses before moving on to scanning and attacking their own networks, ensuring no real network is compromised. They will also learn how intruders escalate privileges and the steps necessary to secure a system. Additionally, students will explore topics such as Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. By the end of this intensive 5-day course, students will have gained hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed these minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
This course is ideal for professionals working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker (CEH) certification is a highly sought-after cybersecurity credential globally.
This program integrates comprehensive instruction and practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Those who successfully pass both exams will earn the prestigious CEH Master credential, along with their CEH certification.
Students have the option to add either the CPENT or CHFI course to their training package.
Each student will receive training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course through EC-Council’s online, self-paced streaming video program.
CPENT (Pen-test):
This course teaches students how to apply the concepts and tools learned in the CEH program to a penetration testing methodology using a live cyber range.
CHFI (Computer Forensics):
This course provides a methodological approach to computer forensics, including techniques for searching and seizing evidence, maintaining chain-of-custody, acquiring and preserving digital data, analyzing it, and reporting findings.
Course Description
The CEH program offers an in-depth understanding of the various phases of ethical hacking, attack vectors, and preventive countermeasures. It will teach you how hackers think and operate maliciously, equipping you to better secure your organization's infrastructure and defend against potential threats. By gaining insight into system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize risks.
The CEH course is designed with a hands-on approach, covering each ethical hacking domain and methodology systematically. This practical experience allows you to demonstrate the knowledge and skills required to earn the CEH credential. You will gain a new perspective on the responsibilities and measures necessary for robust security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To achieve the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to assess your ability to apply the principles taught in the CEH course. The practical exam requires you to demonstrate ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not use simulations but instead challenges you with a live range that mimics a corporate network using real virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical will earn you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To demonstrate your proficiency in ethical hacking, we test your skills with real-world challenges in a realistic environment. You will be required to complete specific ethical hacking tasks within a time limit, just as you would encounter in the field.
The EC-Council CEH (Practical) exam features a complex network that replicates a large organization’s actual infrastructure, including various network systems like DMZs and firewalls. You must use your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing in an enterprise network environment that requires attacking, exploiting, evading, and defending. If you have only worked with flat networks, CPENT’s live practice range will elevate your skills by teaching you to pen test IoT systems, OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, double pivot into hidden networks, and customize scripts and exploits to access the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course offers a vendor-neutral perspective on digital forensics. It covers major forensic investigation scenarios and provides students with hands-on experience using various forensic techniques and standard tools necessary to conduct successful computer forensic investigations.