Course objectives
After completing this course, students will be able to:
- Identify and analyze various attack techniques
- Detect and respond to security incidents
- Conduct forensic investigations
- Perform network and system forensics
- Use advanced security tools and techniques
- Mitigate security risks and vulnerabilities
Course outlines
- Fundamental Incident Handling
- Incident Response Lifecycle
- Incident Classification and Prioritization
- Incident Response Planning
- Digital Forensics Fundamentals
- Network and System Attacks
- Network Scanning Techniques
- Web Application Attacks
- Buffer Overflow Attacks
- Password Attacks
- Social Engineering Attacks
- Advanced Incident Response
- Malware Analysis
- Incident Investigation and Analysis
- Network Traffic Analysis
- Log Analysis
- Incident Reporting and Documentation
- Threat Hunting and Cyber Threat Intelligence
- Threat Intelligence Sources
- Threat Hunting Techniques
- Indicators of Compromise (IOCs)
- Threat Modeling and Risk Assessment