Module 01 – ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS

  1. Workbook (Pdf)
  2. Overview
  3. Read Analysis Reports
  4. Read Analysis Reports Part 2
  5. Read Analysis Reports Part 3
  6. Describe CVSS 3.0
  7. Describe CVSS 3.0 Part 2
  8. Describe CVSS 3.0 Part 3
  9. Understand Windows File Systems
  10. Understand Windows File Systems Part 2
  11. Understand Linux File Systems
  12. Identify Forensic Evidence
  13. Identify Forensic Evidence Part 2
  14. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – INCIDENT RESPONSE

  1. Workbook (Pdf)
  2. Incident Response Elements
  3. Incident Response Elements Part 2
  4. Describe CSIRT Goals
  5. Identify Cybersec Elements And Frameworks
  6. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – INCIDENT HANDLING

  1. Workbook (Pdf)
  2. Classify And Categorize Intrusions
  3. Classify And Categorize Intrusions Part 2
  4. Classify And Categorize Intrusions Part 3
  5. Apply NIST.SP800-61 R2 To Events
  6. NIST SP800-86 Evidence Handling
  7. Apply VERIS Schema Categories
  8. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – NETWORK INTRUSION ANALYSIS

  1. Workbook (Pdf)
  2. Interpret Basic Regular Expressions
  3. Interpret Basic Regular Expressions Part 2
  4. Describe Protocol Headers
  5. Describe Protocol Headers Part 2
  6. Describe Protocol Headers Part 3
  7. Describe IP Headers
  8. Describe IP Headers Part 2
  9. Describe IP Headers Part 3
  10. Describe ICMP Intrusion
  11. Describe ICMP Intrusion Part 2
  12. Describe ICMP Intrusion Part 3
  13. Describe ICMP Intrusion Part 4
  14. Describe Transport Layer Headers
  15. Describe Transport Layer Headers Part 2
  16. Describe Transport Layer Headers Part 3
  17. Describe HTTP Headers
  18. Describe HTTP Headers Part 2
  19. Describe HTTP Headers Part 3
  20. Identify Netflow V5 Records
  21. Identify Netflow V5 Records Part 2
  22. Examine Intrusion Events
  23. Intrusion Event Technologie
  24. Intrusion Event Technologies Part 2
  25. Intrusion Event Technologies Part 3
  26. Intrusion Impact Analysis
  27. Intrusion Impact Analysis Part 2
  28. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – DATA AND EVENT ANALYSIS

  1. Workbook (Pdf)
  2. Describe Data Normalization
  3. Describe 5 Tuple Correlation
  4. FirePower Management Console
  5. Compare And Contrast Analysis Methods
  6. Review Quiz (Number of attempts allowed: Unlimited)