Course: Entry Point

An overview of everything. Start here if you're just getting into incident investigation!

Breaking into a cyber-security career can be difficult. Get your foot in the door with a broad understanding of cyber-security topics. In this course, you will get an introduction to some of the other Cyber Fire courses with extra help to move you from a regular computer user to an entry level cyber-security professional.

Learn about the basic layout inside files and how to know if a file you download is an exact copy of the file you intended to download and not a corrupted or malicious look-alike. Look into information that flows across networks and how to capture it for analysis. Dig deeper into operating systems by looking at processes, memory and configuration. Understand what information you should gather when you see something that doesn’t look right and how to report than information.

What to expect

This course will focus on introducing topics with brief lectures, followed by hands-on exercises to further explore those topics. During the exercises, instructors and teaching assistants will be available to answer questions and provide guidance. Classes general start at 8:00 AM and wrap up at 5:00 PM. Please consult the schedule for this event for exact times. Breaks mid-morning, lunch and mid-afternoon give you a chance to clear your mind or continue working on exercises at your discretion.

Who should attend?

  • Entry Level Network Operation Center Analysts
  • Entry Level Security Operations Center Analysts
  • Managers wanting to gain a basic understanding of security concepts
  • Windows Users interested in security

Is this the right class for me?

If you looked at the other Cyber Fire course descriptions and are concerned that they are too advanced, you are in the right spot.

If you have basic skills in network protocols, network packet capture, viewing files in hex editors and/or calculating file hashes, you may want to consider one of the more advanced courses.

Day 1

Topics Duration
  • Workstation Introduction
  • File Analysis
  • Host Forensics
  • Forensic Disk Imaging
  • File Carving

Day 2

Topics Duration
  • Network Layers
  • Networking Routing
  • Network Packet Capture
  • Network Protocols
  • Network Scanning
  • Malware Analysis

Day 3

Topics Duration
  • Incident Reporting
  • Recent Events
  • Mock Incident Practice

Laptop Configuration

The class requires laptops with virtualization software. We recommend VMWare products such as Workstation Pro or Workstation Player for Windows and Linux or VMWare Fusion for OSX. VirtualBox will work, but you may be limited on advanced virtual machine functionality.

A virtual .ova file for the class is coming soon.