Training on CyberCPR
We can provide training for Enterprise CyberCPR customers
For Enterprise customers we can provide training on how to maximize your use of CyberCPR in your organisation.
We cover deployment, user and group management as well as evidence handing processes and developing workflows.
Additionally, our experienced Incident Handlers can assist organisations to mature their Incident Response processes and provide focused skill improvement sessions for their staff on a variety of areas including:
General Case/Incident Management
Dealing with mass compromise
Forensic readiness training
Forensics of Windows systems
Forensics of Linux systems
Network Forensics - both small and large scale
Training with CyberCPR
If you want to use CPR in your training course please contact us as we can assist you with a special Educational version that will allow staff to monitor students rather than having students deploying individual community versions.
References to CPR in Training materials
Please contact us before including CPR in your training materials. This will ensure you can have access to the latest versions for screenshots etc.
CPR is already included in several training courses including the SANS SEC504 – Hacker Tools, Techniques, Exploits and Incident Handling course.
Training with our staff

If you want to go on a training course with some of our staff, we will be publishing our public course schedule shortly.
In addition Steve Armstrong is a certified SANS Instructor, to check out his teaching schedule, go to Steve’s profile page on the SANS.org website.
LATEST NEWS

Convergent Risks acquisition of Logically Secure
Convergent is pleased to announce that it has acquired Logically Secure Limited, the Cheltenham headquartered, technical testing, incident response and cyber security consultancy business. Logically Secure’s market leading CyberCPR™ incident response and case management platform

6 steps to defending your business with Incident Response
What are the phases of incident response and what are the key points within each? In this article we look at the 6 phases of incident response, to help you defend your business, in detail:

What’s wrong with having an internet facing login page? – SQL injection in Aptean
Exposing administrative interfaces can be dangerous – SQL injection in Aptean TLDR; We have found a time-based SQL injection in Aptean Product Configurator v4.0 SP6 – 4.61.0000 which allowed for database access. Have you ever wondered