IR250 - Incident Investigation Training Logo

IR250 - Incident Investigation Training

Live Online & Classroom Enterprise Training

A hands-on incident investigation course that teaches how to collect and analyze digital evidence — including disk, memory, file system, and registry artifacts — using forensic tools such as OpenText Endpoint Investigator within investigation scenarios.

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is IR250 - Incident Investigation Training about?

This hands-on course focuses on the use of OpenText™ Endpoint Investigator and other tools to acquire and analyze data in a manner that demonstrates the relevance of various file system, network, and memory-based artifacts in the context of an investigative scenario. Students will examine the different factors that affect incident investigations, including planning, basic forensic principles, and examination and response options. They will observe how failing to take note of important issues and implement suitable policies can lead to weaknesses in IT infrastructure and the loss of evidential data. Conversely students will learn to appreciate the benefits of forward planning, employee education, audit and event logging, and suitable access-control policies. This course is very much focused on the recovery of data for the purposes of an investigation and the context in which said data may prove valuable. Students will participate in practical exercises throughout the course to underscore and drive home the skills taught.

What are the objectives of IR250 - Incident Investigation Training ?

After completing this course, you will be able to:

  • Understand incident investigation and response planning fundamentals.
  • Capture and analyze disk and memory data using Endpoint Investigator and related tools.
  • Interpret Windows file system metadata, timestamps, and registry artifacts.
  • Identify and recover encrypted and hidden data artifacts (e.g., EFS/BitLocker, alternate data streams).
  • Examine event logs, shellbags, USN change logs, shortcuts, browser histories, and shadow copies for investigative context.

Who is IR250 - Incident Investigation Training for?

This training is ideal for:

  • Digital forensic analysts and incident responders.
  • Security operations center (SOC) personnel involved in investigations.
  • IT professionals responsible for handling breaches and evidence collection.
  • Security engineers wanting practical forensic skills.
  • Practitioners preparing for more advanced DFIR and EnCase training.

What are the prerequisites for IR250 - Incident Investigation Training?

Participants should ideally have:

  • Completed DF120 – Foundations in Digital Forensics or equivalent knowledge.
  • Basic understanding of Windows operating systems and file systems.
  • Familiarity with command-line tools and data acquisition basics.
  • General knowledge of cybersecurity and incident response concepts.
  • Access to forensic tools and lab environment for exercises.

Available Training Modes

Live Online Training

4 Days

Who is the instructor for this training?

The trainer for this IR250 - Incident Investigation Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Course Logo

IR250 - Incident Investigation Training - Certification & Exam

  • SpringPeople is the Authorized Training Partner of Opentext.
  • The training fees is exclusive of exam cost.
  • For any queries, feel free to reach us at Opentext@springpeople.com

Reviews