Class Catalog
Entry Point
icon
A foundational introduction to digital forensics and incident investigation through hand-on exercises in binary understanding, forensic memory and disk image analysis, network traffic inspection, and end-to-end investigation of a simulated breach incident.
beginner
Foundry Capstone
icon
Bring together knowledge of all Foundry subjects to work through a simulated exercise over five days.
expert
Host Forensics
icon
Learn the fundamentals of conducting a forensic analysis of a Windows system by analyzing memory images collected from compromised hosts.
intermediate
Incident Coordination 1
icon
Learn to effectively manage and respond to cyber incidents through the Incident Response Lifecycle, emphasizing calm coordination, data analysis, and communication with leadership.
intermediate
Incident Coordination 2
icon
Work through advanced topics in incident response coordination, daily operations, and large incident management over five days of classwork.
advanced
Malware Analysis 1
icon
Gain foundational knowledge and practical skills to identify, analyze, and mitigate malware threats, using hands-on techniques and tools to understand malicious software behavior and its impact on systems.
intermediate
Malware Analysis 2
icon
Delve into sophisticated techniques for dissecting complex malware, emphasizing reverse engineering, behavioral analysis, and the use of advanced tools to uncover intricate attack vectors and overcome anti-analysis methods.
advanced
Network Archaeology 1
icon
Unearth and understand hidden data in network traffic, spanning from foundations of known protocols and encodings to beginning reverse engineering of novel or misused protocols and basic obfuscation of artifacts.
intermediate
Network Archaeology 2
icon
Unearth and understand hidden data in network traffic, emphasizing the identification of novel or misused protocols and reverse engineering their protocols and artifacts, including those trying to hide behind encryption, compression, and novel encoding.
expert
Operational Technology 1
icon
Identify unique characteristics of computers interfacing with physical environments and observe some of their security challenges.
beginner
Operational Technology 2
icon
Delve into the components of operational technology systems and examine their distinct cybersecurity challenges in depth.
advanced