Wait a minute..
This course is intended for anyone who wants to learn about cyber intelligence concepts and methods using open-source tools for operational security, infiltration, analysis, recommendation, and opportunity presentation, giving organizations first-hand understanding of their Internet attack surface.
This course is
intended for anyone who wants to learn about cyber intelligence concepts and
methods using open-source tools for operational security, infiltration,
analysis, recommendation, and opportunity presentation, giving organizations
first-hand understanding of their Internet attack surface. We strive to advance
participants' capabilities in conducting cyber intelligence by outlining best
practices and appropriate solutions to common challenges.
On this course,
you will learn how to understand the threat and identify the attackers, how to
respond an incident and conduct the analysis needed, learn how to consolidate and broaden understanding of filesystem
forensics, advanced adversary investigations, incident response tactics, and
advanced intrusion investigations, and also learn how to master advanced
intrusion investigation and incident response, as well as expand their investigative
skills beyond traditional host-based digital forensics.
Write a public review