Unearth and understand hidden data in network traffic, emphasizing the identification of novel or misused protocols and reverse engineering their protocols and artifacts, including those trying to hide behind encryption, compression, and novel encoding.
Full DescriptionLearn the fundamentals of conducting a forensic analysis of a Windows system by analyzing memory images collected from compromised hosts.
Full DescriptionGain foundational knowledge and practical skills to identify, analyze, and mitigate malware threats, using hands-on techniques and tools to understand malicious software behavior and its impact on systems.
Full DescriptionIdentify unique characteristics of computers interfacing with physical environments and observe some of their security challenges.
Full DescriptionA foundational introduction to digital forensics and incident investigation through hand-on exercises in binary understanding, forensic memory and disk image analysis, network traffic inspection, and end-to-end investigation of a simulated breach incident.
Full DescriptionLearn to effectively manage and respond to cyber incidents through the Incident Response Lifecycle, emphasizing calm coordination, data analysis, and communication with leadership.
Full Description