@ 2023 Cyber Dojo. All rights reserved.
Description
Curriculum
Instructor
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Incident Handler course. This course equips participants with the essential skills and knowledge to effectively respond to cybersecurity incidents. The course emphasizes a hands-on, practical approach to incident response in both cloud and on-premises environments, focusing on the detection and management of security breaches.
- Key Components of Incident Handler:
-
Dynamic Approach to Incident Response: Learn to verify, scope, contain, assess, and remediate threats effectively.
- Windows, Linux, and Cloud Systems: Gain skills to respond to incidents across various platforms.
-
PowerShell for Data Collection: Leverage PowerShell for threat hunting and cyber investigation.
-
Generative AI in Incident Response: Accelerate incident analysis and reporting using AI technologies.
-
Investigative Analysis: Examine incident evidence and correlate findings from multiple sources.
-
Understanding Attacker Techniques: Explore tools and methods attackers use to anticipate and defend against threats.
-
Incident Response Process Development: Build a structured incident response process within your organization.
-
Malware Investigations: Conduct thorough analyses of malware behaviors and characteristics.
-
Network Investigations: Examine network traffic to identify anomalies and malicious activities.
-
Memory Investigations with Volatility: Utilize the Volatility framework for in-depth memory analysis of running processes and artifacts.
-
Reconnaissance and Enumeration: Learn techniques to identify vulnerabilities using reconnaissance methods.
-
Password and Multi-Factor Authentication Attacks: Investigate attacks targeting password and MFA weaknesses.
-
Public-Facing and Drive-By Attacks: Apply techniques to exploit vulnerabilities on public servers and web applications.
-
Post-Exploitation Techniques: Assess risks and implement strategies after initial exploitation to secure systems.
-
Cloud Asset Discovery: Identify shadow cloud systems and evaluate exposure risks to your organization.
-
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Certification Opportunity:
- You can obtain the GCIH certification, validating the acquired skills and knowledge.
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 10 Sections
- 88 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform3
- Introduction to Incident Handler Course2
- Chapter 1: Incident Response and Cyber Investigations19
- 3.1Chapter 1 Overview6 Minutes
- 3.2Incident Response2 Hours
- 3.3Live Examination3 Hours
- 3.4Virtual Machine Setup8 Minutes
- 3.5Lab 1.1: Live Windows Examination with PowerShell10 Minutes1 Question
- 3.6Network Investigations23 Minutes
- 3.7Lab 1.2: Network Investigation40 Minutes
- 3.8Bonus – Lab 1.2: Network Investigation (with QRadar)55 Minutes
- 3.9Memory Investigations36 Minutes
- 3.10Lab 1.3: Memory Investigation48 Minutes
- 3.11Quiz: Memory Analysis – Ransomware60 Minutes7 Questions
- 3.12Malware Investigations19 Minutes
- 3.13Lab 1.4: Malware Investigation47 Minutes
- 3.14Cloud Investigation50 Minutes
- 3.15Lab 1.5 Cloud Investigation1 Hour
- 3.16Accelerating IR with Generative AI34 Minutes
- 3.17Assignment: Lab 1.6: Linux Olympics2 Hours
- 3.18Assignment: Lab 1.7: PowerShell Olympics2 Hours
- 3.19Quiz: Malicious PowerShell Analysis45 Minutes6 Questions
- Chapter 2: Recon, Scanning, and Enumeration Attacks22
- 4.1Hacker Tools and Techniques Introduction23 Minutes
- 4.2MITRE ATT&CK Framework25 Minutes
- 4.3Quiz: ATT&CK30 Minutes4 Questions
- 4.4Open Source Intelligence (OSINT)34 Minutes
- 4.5Lab 2.1: OSINT with SpiderFoot23 Minutes
- 4.6DNS Interrogation23 Minutes
- 4.7Lab 2.2: DNS Interrogation34 Minutes
- 4.8Website Reconnaissance40 Minutes
- 4.9Discovery and Scanning with Nmap19 Minutes
- 4.10Lab 2.3: Nmap30 Minutes
- 4.11TryHackMe Bonus Lab: Nmap: The Basics33 Minutes
- 4.12TryHackMe Bonus Lab: Nmap Live Host Discovery33 Minutes
- 4.13TryHackMe Bonus Lab: Nmap Basic Port Scans20 Minutes
- 4.14TryHackMe Bonus Lab: Nmap Advanced Port Scans31 Minutes
- 4.15TryHackMe Bonus Lab: Nmap Post Port Scans26 Minutes
- 4.16Quiz: Nmap60 Minutes41 Questions
- 4.17Cloud Spotlight: Cloud Scanning40 Minutes
- 4.18Lab 2.4: Cloud Scanning27 Minutes
- 4.19SMB Security36 Minutes
- 4.20Lab 2.5: SMB Security Investigation20 Minutes
- 4.21Defense Spotlight: DeepBlue CLI8 Minutes
- 4.22Lab 2.6: Windows Password Spray Attack Detection10 Minutes
- Chapter 3: Password and Access Attacks14
- 5.1Password Attacks23 Minutes
- 5.2Lab 3.1: Password Guessing Attacks with Hydra31 Minutes
- 5.3Cloud Spotlight: Microsoft 365 Password Attacks25 Minutes
- 5.4Lab 3.2: Attacking Microsoft 365 Passwords32 Minutes
- 5.5Quiz: Scanning and Initial Access Rooms2 Days11 Questions
- 5.6Understanding Password Hashes30 Minutes
- 5.7Password Cracking33 Minutes
- 5.8Lab 3.3: John the Ripper21 Minutes
- 5.9Lab 3.4: Hashcat27 Minutes
- 5.10Quiz: Password Cracking2 Hours14 Questions
- 5.11Cloud Spotlight: Insecure Storage29 Minutes
- 5.12Lab 3.5: Cloud Bucket Discovery39 Minutes
- 5.13Multipurpose Netcat24 Minutes
- 5.14Lab 3.6: Netcat’s Many Uses29 Minutes
- Chapter 4: Public-Facing and Drive-By Attacks16
- 6.1Metasploit Framework20 Minutes
- 6.2Lab 4.1: Metasploit Attack and Analysis41 Minutes
- 6.3Drive-By Attacks23 Minutes
- 6.4Lab 4.2: BeEF for Browser Exploitation19 Minutes
- 6.5Defense Spotlight: System Resource Usage Monitor9 Minutes
- 6.6Lab 4.3: System Resource Usage Database Analysis14 Minutes
- 6.7TryHackMe Bonus Lab: Web Application Basics40 Minutes
- 6.8Command Injection20 Minutes
- 6.9Lab 4.4: Command Injection Attack14 Minutes
- 6.10Cross-Site Scripting24 Minutes
- 6.11Lab 4.5: Cross-Site Scripting Attack11 Minutes
- 6.12SQL Injection14 Minutes
- 6.13Lab 4.6: SQL Injection Attack10 Minutes
- 6.14Cloud Spotlight: SSRF and IMDS16 Minutes
- 6.15Lab 4.7: Cloud SSRF and IMDS Attack19 Minutes
- 6.16Quiz: Network Analysis – Web Shell45 Minutes9 Questions
- Chapter 5: Evasion and Post-Exploitation Attacks21
- 7.1Endpoint Security Bypass28 Minutes
- 7.2Bonus: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them2 Hours
- 7.3Lab 5.1: Application Allow List Bypass24 Minutes
- 7.4Pivoting and Lateral Movement12 Minutes
- 7.5Lab 5.2: Pivot Exploitation27 Minutes
- 7.6Hijacking Attacks11 Minutes
- 7.7Lab 5.3: Responder Attack8 Minutes
- 7.8Establishing Persistence30 Minutes
- 7.9Lab 5.4: Establishing Persistence with Metasploit36 Minutes
- 7.10Bonus: How Kerberos Works?18 Minutes
- 7.11Bonus: Kerberoast Attack10 Minutes
- 7.12Bonus: Domain Dominance22 Minutes
- 7.13Bonus: More Kerberos Attacks6 Minutes
- 7.14Bonus: Golden and Silver Ticket11 Minutes
- 7.15Quiz: Breaking Windows3 Days31 Questions
- 7.16Defense Spotlight: RITA16 Minutes
- 7.17Lab 5.5: Real Intelligence Threat Analytics18 Minutes
- 7.18Data Collection17 Minutes
- 7.19Cloud Spotlight: Cloud Post-Exploitation23 Minutes
- 7.20Lab 5.6: Cloud Configuration Assessment27 Minutes
- 7.21Where to Go from Here15 Minutes
- Version 2024 Updates0
- Final Exam1
- Project: Incident Response Strategy and Playbook Development3
Review
Offensive Operations, Pen Testing, and Red Teaming

350 $
250 $
100% positive reviews
57 students
88 lessons
Language: Arabic
10 quizzes
Assessments: Self
Granted Access Time: 52 weeks
Skill level Intermediate
Features
- - Based on SEC504 Version 2024
Courses you might be interested in
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
87 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Incident Handler course. This course equips participants with the essential skills and knowledge to effectively respond...
-
88 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...
-
97 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Digital Forensics, Incident Response & Threat Hunting
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for...
-
54 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...