

Unearth and understand hidden data from network traffic and obfuscated files.
Full Description


Intermediate - Examine malicious software to discover capabilities, methods, and more.
Full Description

Learn the peculiarities of computers that interact with the physical environment.
Full Description

A broad, but shallow introduction to incident investigation techniques. A great place to get started!
Full Description

How to manage incident response teams and communicate clearly and effectively to vested parties.
Full Description