Entry Point
A foundational introduction to digital forensics and incident investigation through hand-on exercises in binary understanding, forensic memory and disk image analysis, network traffic inspection, and end-to-end investigation of a simulated breach incident.
Foundry Capstone
Bring together knowledge of all Foundry subjects to work through a simulated exercise over five days.
Host Forensics
Learn the fundamentals of conducting a forensic analysis of a Windows system by analyzing memory images collected from compromised hosts.
Incident Coordination 1
Learn to effectively manage and respond to cyber incidents through the Incident Response Lifecycle, emphasizing calm coordination, data analysis, and communication with leadership.
Incident Coordination 2
Work through advanced topics in incident response coordination, daily operations, and large incident management over five days of classwork.
Malware Analysis 1
Gain foundational knowledge and practical skills to identify, analyze, and mitigate malware threats, using hands-on techniques and tools to understand malicious software behavior and its impact on systems.
Malware Analysis 2
Delve into sophisticated techniques for dissecting complex malware, emphasizing reverse engineering, behavioral analysis, and the use of advanced tools to uncover intricate attack vectors and overcome anti-analysis methods.
Network Archaeology 1
Unearth and understand hidden data in network traffic, spanning from foundations of known protocols and encodings to beginning reverse engineering of novel or misused protocols and basic obfuscation of artifacts.
Network Archaeology 2
Unearth and understand hidden data in network traffic, emphasizing the identification of novel or misused protocols and reverse engineering their protocols and artifacts, including those trying to hide behind encryption, compression, and novel encoding.
Operational Technology 1
Identify unique characteristics of computers interfacing with physical environments and observe some of their security challenges.
Operational Technology 2
Delve into the components of operational technology systems and examine their distinct cybersecurity challenges in depth.