Professional & dedicated training programs

banner image


The students will learn the anatomy of an intrusion, collection of memory and volatile artifacts, and techniques to unravel the mystery of how the network was compromised.


  • check-icon All participants will receive official certification from Spyder Forensics after successfully completing the course.

Request quote

Here you have the opportunity to register for the current training. Or contact us for more information.

    curve picture