Domenick Labellarte
Those who complete the Digital Forensics, Incident Response, and Threat Hunting course demonstrate the ability to conduct live and dead analysis of both Windows and Linux systems with proper documentation. They understand each stage of the incident response plan, know how to maintain business continuity, and can follow regulatory compliance protocols.
Skills / Knowledge
- Digital Forensics
- Incident Response
- Threat Hunting
- Regulatory Compliance Protocols
Issued on
April 23, 2024
Expires on
Does not expire