Curriculum
10 Sections
88 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
3
1.1
How to book your live sessions
5 Minutes
1.2
Session Booking Panel
1.3
Student Panel
Introduction to Incident Handler Course
2
2.1
Introduction to Incident Handler Course
9 Minutes
2.2
Incident Handler Course Material
5 Minutes
Chapter 1: Incident Response and Cyber Investigations
19
3.1
Chapter 1 Overview
6 Minutes
3.2
Incident Response
2 Hours
3.3
Live Examination
3 Hours
3.4
Virtual Machine Setup
8 Minutes
3.5
Lab 1.1: Live Windows Examination with PowerShell
10 Minutes
1 Question
3.6
Network Investigations
23 Minutes
3.7
Lab 1.2: Network Investigation
40 Minutes
3.8
Bonus – Lab 1.2: Network Investigation (with QRadar)
55 Minutes
3.9
Memory Investigations
36 Minutes
3.10
Lab 1.3: Memory Investigation
48 Minutes
3.11
Quiz: Memory Analysis – Ransomware
60 Minutes
7 Questions
3.12
Malware Investigations
19 Minutes
3.13
Lab 1.4: Malware Investigation
47 Minutes
3.14
Cloud Investigation
50 Minutes
3.15
Lab 1.5 Cloud Investigation
1 Hour
3.16
Accelerating IR with Generative AI
34 Minutes
3.17
Assignment: Lab 1.6: Linux Olympics
2 Hours
3.18
Assignment: Lab 1.7: PowerShell Olympics
2 Hours
3.19
Quiz: Malicious PowerShell Analysis
45 Minutes
6 Questions
Chapter 2: Recon, Scanning, and Enumeration Attacks
22
4.1
Hacker Tools and Techniques Introduction
23 Minutes
4.2
MITRE ATT&CK Framework
25 Minutes
4.3
Quiz: ATT&CK
30 Minutes
4 Questions
4.4
Open Source Intelligence (OSINT)
34 Minutes
4.5
Lab 2.1: OSINT with SpiderFoot
23 Minutes
4.6
DNS Interrogation
23 Minutes
4.7
Lab 2.2: DNS Interrogation
34 Minutes
4.8
Website Reconnaissance
40 Minutes
4.9
Discovery and Scanning with Nmap
19 Minutes
4.10
Lab 2.3: Nmap
30 Minutes
4.11
TryHackMe Bonus Lab: Nmap: The Basics
33 Minutes
4.12
TryHackMe Bonus Lab: Nmap Live Host Discovery
33 Minutes
4.13
TryHackMe Bonus Lab: Nmap Basic Port Scans
20 Minutes
4.14
TryHackMe Bonus Lab: Nmap Advanced Port Scans
31 Minutes
4.15
TryHackMe Bonus Lab: Nmap Post Port Scans
26 Minutes
4.16
Quiz: Nmap
60 Minutes
41 Questions
4.17
Cloud Spotlight: Cloud Scanning
40 Minutes
4.18
Lab 2.4: Cloud Scanning
27 Minutes
4.19
SMB Security
36 Minutes
4.20
Lab 2.5: SMB Security Investigation
20 Minutes
4.21
Defense Spotlight: DeepBlue CLI
8 Minutes
4.22
Lab 2.6: Windows Password Spray Attack Detection
10 Minutes
Chapter 3: Password and Access Attacks
14
5.1
Password Attacks
23 Minutes
5.2
Lab 3.1: Password Guessing Attacks with Hydra
31 Minutes
5.3
Cloud Spotlight: Microsoft 365 Password Attacks
25 Minutes
5.4
Lab 3.2: Attacking Microsoft 365 Passwords
32 Minutes
5.5
Quiz: Scanning and Initial Access Rooms
2 Days
11 Questions
5.6
Understanding Password Hashes
30 Minutes
5.7
Password Cracking
33 Minutes
5.8
Lab 3.3: John the Ripper
21 Minutes
5.9
Lab 3.4: Hashcat
27 Minutes
5.10
Quiz: Password Cracking
2 Hours
14 Questions
5.11
Cloud Spotlight: Insecure Storage
29 Minutes
5.12
Lab 3.5: Cloud Bucket Discovery
39 Minutes
5.13
Multipurpose Netcat
24 Minutes
5.14
Lab 3.6: Netcat’s Many Uses
29 Minutes
Chapter 4: Public-Facing and Drive-By Attacks
16
6.1
Metasploit Framework
20 Minutes
6.2
Lab 4.1: Metasploit Attack and Analysis
41 Minutes
6.3
Drive-By Attacks
23 Minutes
6.4
Lab 4.2: BeEF for Browser Exploitation
19 Minutes
6.5
Defense Spotlight: System Resource Usage Monitor
9 Minutes
6.6
Lab 4.3: System Resource Usage Database Analysis
14 Minutes
6.7
TryHackMe Bonus Lab: Web Application Basics
40 Minutes
6.8
Command Injection
20 Minutes
6.9
Lab 4.4: Command Injection Attack
14 Minutes
6.10
Cross-Site Scripting
24 Minutes
6.11
Lab 4.5: Cross-Site Scripting Attack
11 Minutes
6.12
SQL Injection
14 Minutes
6.13
Lab 4.6: SQL Injection Attack
10 Minutes
6.14
Cloud Spotlight: SSRF and IMDS
16 Minutes
6.15
Lab 4.7: Cloud SSRF and IMDS Attack
19 Minutes
6.16
Quiz: Network Analysis – Web Shell
45 Minutes
9 Questions
Chapter 5: Evasion and Post-Exploitation Attacks
21
7.1
Endpoint Security Bypass
28 Minutes
7.2
Bonus: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them
2 Hours
7.3
Lab 5.1: Application Allow List Bypass
24 Minutes
7.4
Pivoting and Lateral Movement
12 Minutes
7.5
Lab 5.2: Pivot Exploitation
27 Minutes
7.6
Hijacking Attacks
11 Minutes
7.7
Lab 5.3: Responder Attack
8 Minutes
7.8
Establishing Persistence
30 Minutes
7.9
Lab 5.4: Establishing Persistence with Metasploit
36 Minutes
7.10
Bonus: How Kerberos Works?
18 Minutes
7.11
Bonus: Kerberoast Attack
10 Minutes
7.12
Bonus: Domain Dominance
22 Minutes
7.13
Bonus: More Kerberos Attacks
6 Minutes
7.14
Bonus: Golden and Silver Ticket
11 Minutes
7.15
Quiz: Breaking Windows
3 Days
31 Questions
7.16
Defense Spotlight: RITA
16 Minutes
7.17
Lab 5.5: Real Intelligence Threat Analytics
18 Minutes
7.18
Data Collection
17 Minutes
7.19
Cloud Spotlight: Cloud Post-Exploitation
23 Minutes
7.20
Lab 5.6: Cloud Configuration Assessment
27 Minutes
7.21
Where to Go from Here
15 Minutes
Version 2024 Updates
0
Final Exam
1
9.1
Final Exam
119 Minutes
35 Questions
Project: Incident Response Strategy and Playbook Development
3
10.1
Project Overview
10 Minutes
10.2
Project Rubric
15 Minutes
10.3
Project Details and Submission
14 Days
Incident Handler
Search
Lab 1.3: Memory Investigation
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content