Unearth and understand hidden data from network traffic and obfuscated files.
Full DescriptionIntermediate - Examine malicious software to discover capabilities, methods, and more.
Full DescriptionLearn the peculiarities of computers that interact with the physical environment.
Full DescriptionA broad, but shallow introduction to incident investigation techniques. A great place to get started!
Full DescriptionAdvanced topics in incident response coordination, in daily operations, and large incident management. 5 full days of classwork.
Full Description