Curriculum
6 Sections
58 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
5
1.1
About Cyber Dojo
1.2
How to book your live sessions
1.3
Session Booking Panel
1.4
Student Panel
1.5
Join Our Channels
Chapter 1: Advanced Incident Response and Threat Hunting
14
2.1
Introduction to G.C.F.A Preparation (FOR508)
2.2
Lab 0: Before Class Begins: VM Installation
2.3
Lab 1.1: APT Incident Response Challenge – Read Scenario
2.4
The Challenge of Information Security
2.5
Incident Response & Threat Hunting
2.6
Threat Hunting Process
10 Minutes
2.7
Threat Intelligence
2.8
Malware-ology
2.9
Malware Persistence
2.10
Lab 1.2: Malware Persistence Analysis
2.11
Incident Response: Hunting Across the Enterprise
2.12
Lab 1.3: Creating Triage Images with KAPE
2.13
Lab 1.4: Scaling Incident Response and Threat Hunting
2.14
Credential Theft
Chapter 2: Intrusion Analysis
8
3.1
Advanced Evidence of Execution
3.2
Lab 2.1: Evidence of Execution: Prefetch, ShimCache, and Amcache
3.3
Event Log Analysis for Responders and Hunter
3.4
Lab 2.2: Tracking Credential Use with Event Log Explorer
3.5
Lateral Movement Adversary Tactics
3.6
Lab 2.3: Tracking Lateral Movement with EvtxECmd
3.7
Command Line, PowerShell, and WMI Analysis
3.8
Lab 2.4: WMI, PowerShell, and Microsoft Defender Log Analysis
Chapter 3: Memory Forensics in Incident Response and Threat Hunting
10
4.1
Why Memory Forensics?
4.2
Acquiring Memory
4.3
Introduction to Memory Analysis (Part 1)
4.4
Lab 3.1: Identify Rogue Processes
4.5
Introduction to Memory Analysis (Part 2)
4.6
Lab 3.2: Memory Process Objects
4.7
Code Injection, Rootkits, and Extraction (Part 1)
4.8
Lab 3.3: Code Injection
4.9
Code Injection, Rootkits, and Extraction (Part 2)
4.10
Lab 3.4: Memory Extraction and Rootkits
Chapter 4: Timeline Analysis
12
5.1
Malware Discovery
5.2
Lab 4.1: Malware Discovery
5.3
Timeline Analysis Overview
5.4
Filesystem Timeline Creation and Analysis
5.5
Lab 4.2: Filesystem Timeline Creation and Analysis
5.6
Introducing the Super Timeline
5.7
Targeted Super Timeline Creation
5.8
Lab 4.3A: Super Timeline Creation (Windows)
5.9
Lab 4.3B: Super Timeline Creation (Linux)
5.10
Filtering the Super Timeline
5.11
Super Timeline Analysis
5.12
Lab 4.4: Super Timeline Analysis
Chapter 5: Advanced Adversary and Anti-Forensics Detection
9
6.1
Anti-Forensics Overview
6.2
Recovery of Deleted Files via VSS
6.3
Lab 5.1: Mount and Examine VSS Images
6.4
Lab 5.2: VSS Super Timeline Creation
6.5
Advanced NTFS Tactics
6.6
Lab 5.3: NTFS File System Forensics
6.7
Advanced Evidence Recovery
6.8
Defensive Countermeasures
6.9
Lab 5.4: Anti-Forensics Analysis and Data Recovery
Forensic Analyst
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content