Wait a minute..
This course is
intended for anyone who wants to learn about cyber intelligence concepts and
methods using open-source tools for operational security, infiltration,
analysis, recommendation, and opportunity presentation, giving organizations
first-hand understanding of their Internet attack surface. We strive to advance
participants' capabilities in conducting cyber intelligence by outlining best
practices and appropriate solutions to common challenges.
On this course,
you will learn how to understand the threat and identify the attackers, how to
respond an incident and conduct the analysis needed, learn how to consolidate and broaden understanding of filesystem
forensics, advanced adversary investigations, incident response tactics, and
advanced intrusion investigations, and also learn how to master advanced
intrusion investigation and incident response, as well as expand their investigative
skills beyond traditional host-based digital forensics.
Program Requirements
What will I learn?
Curriculum for this course
This course is
intended for anyone who wants to learn about cyber intelligence concepts and
methods using open-source tools for operational security, infiltration,
analysis, recommendation, and opportunity presentation, giving organizations
first-hand understanding of their Internet attack surface. We strive to advance
participants' capabilities in conducting cyber intelligence by outlining best
practices and appropriate solutions to common challenges.
On this course,
you will learn how to understand the threat and identify the attackers, how to
respond an incident and conduct the analysis needed, learn how to consolidate and broaden understanding of filesystem
forensics, advanced adversary investigations, incident response tactics, and
advanced intrusion investigations, and also learn how to master advanced
intrusion investigation and incident response, as well as expand their investigative
skills beyond traditional host-based digital forensics.