ISACA Workshop - Infosecurity North America

ISACA Workshop

  • ISACA Workshop: Technical Versatility in Cybersecurity

    Gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner. Attendees will be led through four interactive online labs that cover packet analysis, malware analysis, file forensics, and browser exploitation. In this workshop, attendees will be lead through four online labs that cover packet analysis, malware analysis, file forensics, and browser exploitation.

    CPD credits: 2

  • Date and time TBC

    Target audience

    Managerial and technical cybersecurity professionals.


    Learning objectives

    • Packet Analysis: Utilizing Wireshark and DNS to build a narrative on a clients activities on the network
    • Malware Analysis: Conducting simple static and dynamic analysis on a nefarious binary file
    • File Forensics: Recovering information from a mobile platform
    • Browser Exploitation: Demonstrating the simplicity of browser attacks using open source software in Kali Linux

    Benefits of attending

    Attendees will gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner as well as the benefit of performance based hands-on training.


    Level: General


    To attend

    This workshop is included in your Infosecurity North America visitor pass subject to availability. Pre-registration is required as numbers are limited.

    To pre-register simply, choose this event under the 'Special Events' section when you are registering for Infosecurity North America. You will then receive joining instructions closer to the time of the event.

  • Interested in attending?

    Online registration is now available. Register before September 30th to get early bird rates.

    Register to attend

    What else is happening?

    See what else we have in store for you at Infosecurity North America 2018.

    See more

Media Partners 2018

EC-Council Infosecurity Magazine ACSC Cyber Defense Magazine Cloud Security Alliance CyberTech ISC2 MassTech EM360 ISMG The Register Crest Crest

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.