Unearth and understand hidden data from network traffic and obfuscated files.
Full DescriptionIntermediate - Examine malicious software to discover capabilities, methods, and more.
Full DescriptionLearn the peculiarities of computers that interact with the physical environment.
Full DescriptionA broad, but shallow introduction to incident investigation techniques. A great place to get started!
Full DescriptionHow to manage incident response teams and communicate clearly and effectively to vested parties.
Full Description