Curriculum
10 Sections
88 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
3
1.1
How to book your live sessions
5 Minutes
1.2
Session Booking Panel
1.3
Student Panel
Introduction to Incident Handler Course
2
2.1
Introduction to Incident Handler Course
9 Minutes
2.2
Incident Handler Course Material
5 Minutes
Chapter 1: Incident Response and Cyber Investigations
19
3.1
Chapter 1 Overview
6 Minutes
3.2
Incident Response
2 Hours
3.3
Live Examination
3 Hours
3.4
Virtual Machine Setup
8 Minutes
3.5
Lab 1.1: Live Windows Examination with PowerShell
10 Minutes
1 Question
3.6
Network Investigations
23 Minutes
3.7
Lab 1.2: Network Investigation
40 Minutes
3.8
Bonus – Lab 1.2: Network Investigation (with QRadar)
55 Minutes
3.9
Memory Investigations
36 Minutes
3.10
Lab 1.3: Memory Investigation
48 Minutes
3.11
Quiz: Memory Analysis – Ransomware
60 Minutes
7 Questions
3.12
Malware Investigations
19 Minutes
3.13
Lab 1.4: Malware Investigation
47 Minutes
3.14
Cloud Investigation
50 Minutes
3.15
Lab 1.5 Cloud Investigation
1 Hour
3.16
Accelerating IR with Generative AI
34 Minutes
3.17
Assignment: Lab 1.6: Linux Olympics
2 Hours
3.18
Assignment: Lab 1.7: PowerShell Olympics
2 Hours
3.19
Quiz: Malicious PowerShell Analysis
45 Minutes
6 Questions
Chapter 2: Recon, Scanning, and Enumeration Attacks
22
4.1
Hacker Tools and Techniques Introduction
23 Minutes
4.2
MITRE ATT&CK Framework
25 Minutes
4.3
Quiz: ATT&CK
30 Minutes
4 Questions
4.4
Open Source Intelligence (OSINT)
34 Minutes
4.5
Lab 2.1: OSINT with SpiderFoot
23 Minutes
4.6
DNS Interrogation
23 Minutes
4.7
Lab 2.2: DNS Interrogation
34 Minutes
4.8
Website Reconnaissance
40 Minutes
4.9
Discovery and Scanning with Nmap
19 Minutes
4.10
Lab 2.3: Nmap
30 Minutes
4.11
TryHackMe Bonus Lab: Nmap: The Basics
33 Minutes
4.12
TryHackMe Bonus Lab: Nmap Live Host Discovery
33 Minutes
4.13
TryHackMe Bonus Lab: Nmap Basic Port Scans
20 Minutes
4.14
TryHackMe Bonus Lab: Nmap Advanced Port Scans
31 Minutes
4.15
TryHackMe Bonus Lab: Nmap Post Port Scans
26 Minutes
4.16
Quiz: Nmap
60 Minutes
41 Questions
4.17
Cloud Spotlight: Cloud Scanning
40 Minutes
4.18
Lab 2.4: Cloud Scanning
27 Minutes
4.19
SMB Security
36 Minutes
4.20
Lab 2.5: SMB Security Investigation
20 Minutes
4.21
Defense Spotlight: DeepBlue CLI
8 Minutes
4.22
Lab 2.6: Windows Password Spray Attack Detection
10 Minutes
Chapter 3: Password and Access Attacks
14
5.1
Password Attacks
23 Minutes
5.2
Lab 3.1: Password Guessing Attacks with Hydra
31 Minutes
5.3
Cloud Spotlight: Microsoft 365 Password Attacks
25 Minutes
5.4
Lab 3.2: Attacking Microsoft 365 Passwords
32 Minutes
5.5
Quiz: Scanning and Initial Access Rooms
2 Days
11 Questions
5.6
Understanding Password Hashes
30 Minutes
5.7
Password Cracking
33 Minutes
5.8
Lab 3.3: John the Ripper
21 Minutes
5.9
Lab 3.4: Hashcat
27 Minutes
5.10
Quiz: Password Cracking
2 Hours
14 Questions
5.11
Cloud Spotlight: Insecure Storage
29 Minutes
5.12
Lab 3.5: Cloud Bucket Discovery
39 Minutes
5.13
Multipurpose Netcat
24 Minutes
5.14
Lab 3.6: Netcat’s Many Uses
29 Minutes
Chapter 4: Public-Facing and Drive-By Attacks
16
6.1
Metasploit Framework
20 Minutes
6.2
Lab 4.1: Metasploit Attack and Analysis
41 Minutes
6.3
Drive-By Attacks
23 Minutes
6.4
Lab 4.2: BeEF for Browser Exploitation
19 Minutes
6.5
Defense Spotlight: System Resource Usage Monitor
9 Minutes
6.6
Lab 4.3: System Resource Usage Database Analysis
14 Minutes
6.7
TryHackMe Bonus Lab: Web Application Basics
40 Minutes
6.8
Command Injection
20 Minutes
6.9
Lab 4.4: Command Injection Attack
14 Minutes
6.10
Cross-Site Scripting
24 Minutes
6.11
Lab 4.5: Cross-Site Scripting Attack
11 Minutes
6.12
SQL Injection
14 Minutes
6.13
Lab 4.6: SQL Injection Attack
10 Minutes
6.14
Cloud Spotlight: SSRF and IMDS
16 Minutes
6.15
Lab 4.7: Cloud SSRF and IMDS Attack
19 Minutes
6.16
Quiz: Network Analysis – Web Shell
45 Minutes
9 Questions
Chapter 5: Evasion and Post-Exploitation Attacks
21
7.1
Endpoint Security Bypass
28 Minutes
7.2
Bonus: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them
2 Hours
7.3
Lab 5.1: Application Allow List Bypass
24 Minutes
7.4
Pivoting and Lateral Movement
12 Minutes
7.5
Lab 5.2: Pivot Exploitation
27 Minutes
7.6
Hijacking Attacks
11 Minutes
7.7
Lab 5.3: Responder Attack
8 Minutes
7.8
Establishing Persistence
30 Minutes
7.9
Lab 5.4: Establishing Persistence with Metasploit
36 Minutes
7.10
Bonus: How Kerberos Works?
18 Minutes
7.11
Bonus: Kerberoast Attack
10 Minutes
7.12
Bonus: Domain Dominance
22 Minutes
7.13
Bonus: More Kerberos Attacks
6 Minutes
7.14
Bonus: Golden and Silver Ticket
11 Minutes
7.15
Quiz: Breaking Windows
3 Days
31 Questions
7.16
Defense Spotlight: RITA
16 Minutes
7.17
Lab 5.5: Real Intelligence Threat Analytics
18 Minutes
7.18
Data Collection
17 Minutes
7.19
Cloud Spotlight: Cloud Post-Exploitation
23 Minutes
7.20
Lab 5.6: Cloud Configuration Assessment
27 Minutes
7.21
Where to Go from Here
15 Minutes
Version 2024 Updates
0
Final Exam
1
9.1
Final Exam
119 Minutes
35 Questions
Project: Incident Response Strategy and Playbook Development
3
10.1
Project Overview
10 Minutes
10.2
Project Rubric
15 Minutes
10.3
Project Details and Submission
14 Days
Incident Handler
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content