Hover a category to view courses…
Topics:
Persistence mechanisms
Advanced registry artifacts
Shimcache, Amcache
Linux bash history & systemd logs
Packet capture & filtering
Identifying C2 traffic
DNS tunneling detection
HTTPS fingerprinting
Static vs dynamic malware analysis
Registry manipulation by malware
Memory indicators of infection
Extracting IOCs
Summary:Combines host + network + malware analysis to fully reconstruct attack timeline.
Final Assessment:Prepare a forensic timeline + executive summary for a simulated intrusion.