FOUR   |   TWENTY ONE     |   90%   |   160

         SCENARIOS                                     LABS                                     HANDS-ON                  HOURS


The Cyber Investigator course is intended for the security forces and was customized for forensic missions in the cyber worlds with an emphasis on the ability to analyze data.

LAB 01

Evidence in Windows OS

LAB 02

Registry Analysis

LAB 03

Evidence in Linux OS

LAB 04

Log Filtering

LAB 05

Volatility Analysis

LAB 09

Analyzing Windows Servers

LAB 13

Using Nmap

LAB 06

Analysing Android OS

LAB 10

Endpoint Log Analysis

LAB 14

Working with Shodan

LAB 07

Wireshark Network Analysis

LAB 08

Analyzing Malicious Traffic

LAB 11

Browser Analysis

LAB 12

Detecting Services and Vulnerabilities

LAB 15


LAB 16

Working with Metasploit Framework

LAB 17

Malware Analysis

LAB 18

Bash Scripting

LAB 19

Digital Fingerprinting

LAB 20


LAB 21

Windows Event Logs

LAB 22

Steg and Carving

LAB 23

Local Attacks

LAB 24

Network Traffic

LAB 25

Forensics Lab

Scenario: CI001

Cybersecurity researchers uncovered a new espionage campaign targeting media, construction, engineering, electronics, and finance sectors in Japan, Taiwan, the U.S., and China. One of the attacked companies alerted the Police, you were tasked to research and find the attackers.


Scenario: CI002

A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. The security team in charge of this case discovered that some connections were made through the darknet. As part of the police security team, you have been assigned to find leads to the spoken hacktivists.


Scenario: CI003

The Indian army hired cybersecurity researchers to gather evidence of an ongoing cyberespionage campaign against them. You were tasked to analyze and find evidence of espionage.


Scenario: CI004

Cybersecurity researchers have discovered a cyber-espionage campaign directed against aerospace and military organizations in Europe and the Middle East with an aim to spy on key employees of the targeted firms. As part of the investigation team in charge of this case, your team have been tasked to investigate any leads to the attacker's group.

cyberium arena scenario
  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber