Curriculum
6 Sections
58 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
5
1.1
About Cyber Dojo
10 Minutes
1.2
How to book your live sessions
5 Minutes
1.3
Session Booking Panel
1.4
Student Panel
1.5
Join Our Channels
Chapter 1: Advanced Incident Response and Threat Hunting
14
2.1
Introduction to Forensic Analyst Course
2.2
Lab 0: Before Class Begins: VM Installation
2.3
Lab 1.1: APT Incident Response Challenge – Read Scenario
2.4
The Challenge of Information Security
2.5
Incident Response & Threat Hunting
2.6
Threat Hunting Process
10 Minutes
2.7
Threat Intelligence
2.8
Malware-ology
2.9
Malware Persistence
2.10
Lab 1.2: Malware Persistence Analysis
2.11
Incident Response: Hunting Across the Enterprise
2.12
Lab 1.3: Creating Triage Images with KAPE
2.13
Lab 1.4: Scaling Incident Response and Threat Hunting
2.14
Credential Theft
Chapter 2: Intrusion Analysis
8
3.1
Advanced Evidence of Execution
3.2
Lab 2.1: Evidence of Execution: Prefetch, ShimCache, and Amcache
3.3
Event Log Analysis for Responders and Hunter
3.4
Lab 2.2: Tracking Credential Use with Event Log Explorer
3.5
Lateral Movement Adversary Tactics
3.6
Lab 2.3: Tracking Lateral Movement with EvtxECmd
3.7
Command Line, PowerShell, and WMI Analysis
3.8
Lab 2.4: WMI, PowerShell, and Microsoft Defender Log Analysis
Chapter 3: Memory Forensics in Incident Response and Threat Hunting
10
4.1
Why Memory Forensics?
4.2
Acquiring Memory
4.3
Introduction to Memory Analysis (Part 1)
4.4
Lab 3.1: Identify Rogue Processes
4.5
Introduction to Memory Analysis (Part 2)
4.6
Lab 3.2: Memory Process Objects
4.7
Code Injection, Rootkits, and Extraction (Part 1)
4.8
Lab 3.3: Code Injection
4.9
Code Injection, Rootkits, and Extraction (Part 2)
4.10
Lab 3.4: Memory Extraction and Rootkits
Chapter 4: Timeline Analysis
12
5.1
Malware Discovery
5.2
Lab 4.1: Malware Discovery
5.3
Timeline Analysis Overview
5.4
Filesystem Timeline Creation and Analysis
5.5
Lab 4.2: Filesystem Timeline Creation and Analysis
5.6
Introducing the Super Timeline
5.7
Targeted Super Timeline Creation
5.8
Lab 4.3A: Super Timeline Creation (Windows)
5.9
Lab 4.3B: Super Timeline Creation (Linux)
5.10
Filtering the Super Timeline
5.11
Super Timeline Analysis
5.12
Lab 4.4: Super Timeline Analysis
Chapter 5: Advanced Adversary and Anti-Forensics Detection
9
6.1
Anti-Forensics Overview
6.2
Recovery of Deleted Files via VSS
6.3
Lab 5.1: Mount and Examine VSS Images
6.4
Lab 5.2: VSS Super Timeline Creation
6.5
Advanced NTFS Tactics
6.6
Lab 5.3: NTFS File System Forensics
6.7
Advanced Evidence Recovery
6.8
Defensive Countermeasures
6.9
Lab 5.4: Anti-Forensics Analysis and Data Recovery
Forensic Analyst
Search
About Cyber Dojo
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content