@ 2023 Cyber Dojo. All rights reserved.
Forensic Analyst
A course by
Apr/2025
58 lessons
English
0 student
This course will be coming soon😍😍
Description
Curriculum
Instructor
Unlock the advanced knowledge and practical skills to master Incident Response and Threat Hunting with Cyber Dojo’s Forensic Analyst. This course is designed to equip learners with the expertise needed to effectively detect, investigate, and remediate cyber incidents. Through hands-on exercises, real-world scenarios, and expert-led discussions, participants will build the skills required to analyze advanced threats, identify malicious activity, and respond proactively to breaches.
-
Key Components of Forensic Analyst:
- Attacker Tradecraft: Understanding adversary techniques to perform effective compromise assessments.
- Incident Detection: Mastering the skills to detect how and when a breach occurred.
- Compromise Identification: Quickly identifying compromised systems and infected hosts.
- Damage Assessment: Determining what was read, stolen, or changed during a breach.
- Containment and Remediation: Effectively containing and remediating incidents of all types.
- Threat Intelligence: Developing and utilizing threat intelligence to track adversaries.
- Advanced Forensics Skills: Building advanced skills to counter anti-forensics and data hiding.
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Certification Opportunity:
- You can obtain the GCFA certification validating the acquired skills and knowledge.
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 6 Sections
- 58 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform5
- Chapter 1: Advanced Incident Response and Threat Hunting14
- 2.1Introduction to G.C.F.A Preparation (FOR508)
- 2.2Lab 0: Before Class Begins: VM Installation
- 2.3Lab 1.1: APT Incident Response Challenge – Read Scenario
- 2.4The Challenge of Information Security
- 2.5Incident Response & Threat Hunting
- 2.6Threat Hunting Process10 Minutes
- 2.7Threat Intelligence
- 2.8Malware-ology
- 2.9Malware Persistence
- 2.10Lab 1.2: Malware Persistence Analysis
- 2.11Incident Response: Hunting Across the Enterprise
- 2.12Lab 1.3: Creating Triage Images with KAPE
- 2.13Lab 1.4: Scaling Incident Response and Threat Hunting
- 2.14Credential Theft
- Chapter 2: Intrusion Analysis8
- 3.1Advanced Evidence of Execution
- 3.2Lab 2.1: Evidence of Execution: Prefetch, ShimCache, and Amcache
- 3.3Event Log Analysis for Responders and Hunter
- 3.4Lab 2.2: Tracking Credential Use with Event Log Explorer
- 3.5Lateral Movement Adversary Tactics
- 3.6Lab 2.3: Tracking Lateral Movement with EvtxECmd
- 3.7Command Line, PowerShell, and WMI Analysis
- 3.8Lab 2.4: WMI, PowerShell, and Microsoft Defender Log Analysis
- Chapter 3: Memory Forensics in Incident Response and Threat Hunting10
- 4.1Why Memory Forensics?
- 4.2Acquiring Memory
- 4.3Introduction to Memory Analysis (Part 1)
- 4.4Lab 3.1: Identify Rogue Processes
- 4.5Introduction to Memory Analysis (Part 2)
- 4.6Lab 3.2: Memory Process Objects
- 4.7Code Injection, Rootkits, and Extraction (Part 1)
- 4.8Lab 3.3: Code Injection
- 4.9Code Injection, Rootkits, and Extraction (Part 2)
- 4.10Lab 3.4: Memory Extraction and Rootkits
- Chapter 4: Timeline Analysis12
- 5.1Malware Discovery
- 5.2Lab 4.1: Malware Discovery
- 5.3Timeline Analysis Overview
- 5.4Filesystem Timeline Creation and Analysis
- 5.5Lab 4.2: Filesystem Timeline Creation and Analysis
- 5.6Introducing the Super Timeline
- 5.7Targeted Super Timeline Creation
- 5.8Lab 4.3A: Super Timeline Creation (Windows)
- 5.9Lab 4.3B: Super Timeline Creation (Linux)
- 5.10Filtering the Super Timeline
- 5.11Super Timeline Analysis
- 5.12Lab 4.4: Super Timeline Analysis
- Chapter 5: Advanced Adversary and Anti-Forensics Detection9
- 6.1Anti-Forensics Overview
- 6.2Recovery of Deleted Files via VSS
- 6.3Lab 5.1: Mount and Examine VSS Images
- 6.4Lab 5.2: VSS Super Timeline Creation
- 6.5Advanced NTFS Tactics
- 6.6Lab 5.3: NTFS File System Forensics
- 6.7Advanced Evidence Recovery
- 6.8Defensive Countermeasures
- 6.9Lab 5.4: Anti-Forensics Analysis and Data Recovery
Review
Digital Forensics, Incident Response & Threat Hunting

400 $
300 $
100% positive reviews
0 student
58 lessons
Language: English
0 quiz
Assessments: Yes
Granted Access Time: 52 weeks
Skill level Expert
Courses you might be interested in
Digital Forensics, Incident Response & Threat Hunting
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for...
-
54 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Incident Handler course. This course equips participants with the essential skills and knowledge to effectively respond...
-
88 Lessons
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
87 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Enterprise Penetration Tester course. This course equips participants with the essential skills and techniques for conducting...
-
116 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...