Prerequisites
Solid knowledge of IT security, networking, and system administration. Practical IT experience is recommended. A pre-assessment test is offered before the training.
Target Audience
- →System and network engineers/administrators
- →Information Security Managers (CISO)
- →SOC analysts and CERT/CSIRT teams
- →IT security consultants
- →Technical auditors and pentesters
- →IT professionals moving into incident response
Expected Outcomes
Master proper response procedures when intrusions occur on machines or networks
Collect and preserve electronic evidence integrity within the legal framework
Analyze intrusions post-incident with standard forensic tools (Splunk, Volatility)
Strengthen IS security after a security incident
Write a legally exploitable investigation report
Companies in Shanghai using this training
- SAIC Motor - Awareness training for 500+ employees
- China Eastern Airlines - Ongoing certification program
- ICBC - Security audit and custom training
- Zhangjiang Hi-Tech Park startups - Monthly group training sessions
Regulatory Compliance
MLPS (Multi-Level Protection Scheme), Cybersecurity Law of China, PIPL (Personal Information Protection Law), growing ISO 27001 adoption
FAQs
Ready to get started?
Next session in Shanghai
January 12, 2026
Pricing adapted to the Shanghai market. Inter-company and in-house training available. Custom quote within 24h.