An overview of everything. Start here if you're just getting into incident investigation!
Examine memory and disk forensic artifacts to find forensic artifacts.
How to manage incident response teams and communicate clearly and effectively to vested parties.
Examine malicious software to discover capabilities, methods, and more.
A combination of "Binary Network Protocols 101", "Cryptanalysis 101", and "Back Engineering 101", with a focus on mathematics and information theory.
Learn the peculiarities of computers that interact with the physical environment.