An overview of everything. Start here if you're just getting into incident investigation!
Examine memory and disk forensic artifacts to find forensic artifacts.
How to manage incident response teams and communicate clearly and effectively to vested parties.
Examine malicious software to discover capabilities, methods, and more.
Using Mathematics and Information Theory, write decoding software for malware network protocols.
Learn the peculiarities of computers that interact with the physical environment.