Incident Response
About: In this module of the training, the participants will learn how to conduct a full investigation and how to define sets of rules and …
About: The participants will gain the required background for Windows systems a Cyber analyst needs to understand and investigate attacks. Subjects covered: Intro to computer
About: In this module, participants will dive into TCP/IP Model and common protocols, learn how to capture and analyse network traffic, use Python to implement
About: This module is relevant for participants who have little or no Linux experience. In this module, the participants will be introduced to the Linux
Course Summary This module is relevant for participants who have some programming experience but are not familiar with Python. This module will cover all the
About: In this module of the training, the participants will learn how to conduct a full investigation and how to define sets of rules and …
About: This module is the first defence-oriented step of the training. The participants will learn how to conduct basic research and investigation of suspicious network …
Subjects covered: The Art and Science of Resume Writing Understand what a resume is and is not Understanding how resumes are processed Types of resume …
About: In this module, the participants will learn about the cyber kill chain and practice its different steps and components. The participants will analyse case …
About: The participants will gain the required background for Windows systems a Cyber analyst needs to understand and investigate attacks. Subjects covered: Intro to computer …
About: In this module, participants will dive into TCP/IP Model and common protocols, learn how to capture and analyse network traffic, use Python to implement …