Unearth and understand hidden data in network traffic, emphasizing the identification of novel or misused protocols and reverse engineering their protocols and artifacts, including those trying to hide behind encryption, compression, and novel encoding.
Full DescriptionLearn the fundamentals of conducting a forensic analysis of a Windows system by analyzing memory images collected from compromised hosts.
Full DescriptionGain foundational knowledge and practical skills to identify, analyze, and mitigate malware threats, using hands-on techniques and tools to understand malicious software behavior and its impact on systems.
Full DescriptionIdentify unique characteristics of computers interfacing with physical environments and observe some of their security challenges.
Full DescriptionA foundational introduction to digital forensics and incident investigation through hand-on exercises in binary understanding, forensic memory and disk image analysis, network traffic inspection, and end-to-end investigation of a simulated breach incident.
Full DescriptionWork through advanced topics in incident response coordination, daily operations, and large incident management over five days of classwork.
Full Description