CYBER INVESTIGATOR/ CYB601
FOUR | TWENTY ONE | 90% | 160
SCENARIOS LABS HANDS-ON HOURS
The Cyber Investigator course is intended for the security forces and was customized for forensic missions in the cyber worlds with an emphasis on the ability to analyze data.
Evidence in Windows OS
Evidence in Linux OS
Analyzing Windows Servers
Analysing Android OS
Endpoint Log Analysis
Working with Shodan
Wireshark Network Analysis
Analyzing Malicious Traffic
Detecting Services and Vulnerabilities
Working with Metasploit Framework
Windows Event Logs
Steg and Carving
Cybersecurity researchers uncovered a new espionage campaign targeting media, construction, engineering, electronics, and finance sectors in Japan, Taiwan, the U.S., and China. One of the attacked companies alerted the Police, you were tasked to research and find the attackers.
A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. The security team in charge of this case discovered that some connections were made through the darknet. As part of the police security team, you have been assigned to find leads to the spoken hacktivists.
The Indian army hired cybersecurity researchers to gather evidence of an ongoing cyberespionage campaign against them. You were tasked to analyze and find evidence of espionage.
Cybersecurity researchers have discovered a cyber-espionage campaign directed against aerospace and military organizations in Europe and the Middle East with an aim to spy on key employees of the targeted firms. As part of the investigation team in charge of this case, your team have been tasked to investigate any leads to the attacker's group.