COURSE

Cyber Defender 2

Cyber Defender 2 focuses on the skills of memory and disk forensics, reporting, and responding to cybersecurity incidents. Acquiring these skills expands a graduate’s career possibilities to include digital forensics analyst and incident responder. This course takes place over 10 weeks at a rate of 15 hours per week.

SKILL LEVEL

Beginner

DURATION

10 Weeks at 15 Hours per Week

CERTIFICATE OF COMPLETION

Included with Course Purchase

PREREQUISITES

A Pre-Assessment is Required

Cyber Defender 2

UPCOMING START DATES

No dates are scheduled at this time, please contact us to apply today!

THE CYBER ACADEMY

MONTH DAY
  • 34 Weeks at 25 Hours per Week
  • Application Deadline June 15

THE CYBER ACADEMY

MONTH DAY
  • 34 Weeks at 25 Hours per Week
  • Application Deadline June 15

THE CYBER ACADEMY

MONTH DAY
  • 34 Weeks at 25 Hours per Week
  • Application Deadline June 15

FIND THE RIGHT FIT

WHO SHOULD ENROLL

Students who have successfully completed The Cyber Academy: Defense and who want to learn more about the “attack side” of cyber security and cyber operations.

SKILLS TO TAKE WITH YOU

LEARNING OUTCOMES

  • Digital forensics

  • Incident response

ADVOCATE YOUR CAREER

CAREER PATHS

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

IMMEDIATE IMMERSION

UPCOMING START DATES

START DATE
PACE
CAMPUS
STATUS
AUGUST 7, 2023
Full-time
Online
Few spots left!
AUGUST 7, 2023
Full-time
Online
Few spots left!
AUGUST 7, 2023
Full-time
Online
Few spots left!
AUGUST 7, 2023
Full-time
Online
Few spots left!

COMPARE AND CONTRAST

GO AT YOUR OWN PACE

FULL-Time

You’re ready to commit to a full-time course load. You’ll graduate in 15 weeks thanks to a rigorous schedule: 8 hours a day, Monday to Friday.

  • 15 weeks long
  • In-person or online
  • Synchronous learning with your cohort
  • Course highlights:
  • Group work with instructor help
  • Paired with design sessions
  • Lab time with instructional staff
FULL-Time

Our part-time course is designed for busy people. If you don’t have 8 free hours to dedicate a day (same), then our part-time course is for you.

  • Paced to complete at 40 weeks
  • Online only
  • Asynchronous learning at your own pace
  • Course highlights:
  • Pre-recorded lessons
  • Optional live lectures and office hours
  • Slack with classmates and instructors

FINANCE OPTIONS

TUITION FUNDING

We have teamed up with Meritize to offer our students a unique financing option. Meritize works with students, educators, and employers to help people succeed in skills-based careers. Want to learn more? Check out their FAQ page here, or give them a call at 833-MERIT-4-U. Ready to see if you qualify? Check your options.

PROGRAM OVERVIEW

Cyber Defender 2 focuses on the skills of memory and disk forensics, reporting, and responding to cybersecurity incidents. Acquiring these skills expands a graduate’s career possibilities to include digital forensics analyst and incident responder.

If you cannot commit to enrolling into a program in its entirety, all of the courses from our programs, including Cyber Defender 2, are available for purchase individually.

Cyber Defender 2

CURRICULUM

Students perform forensics examination of a memory image taken from a computer to identify sophisticated malware that infected the device.

OBJECTIVE:  Acquire a working knowledge of process structures in memory using Volatility
OBJECTIVE: “Know normal to find evil”
OBJECTIVE: Formulate  plan for a memory forensics investigation
OBJECTIVE:  Recognize malware “footprints” in a forensic memory image
OBJECTIVE:  Locate a malicious binary in a forensic memory image
OBJECTIVE:  Corroborate findings with other sources such as [Splunk] SIEM logs
OBJECTIVE:  Identify malware actions such as privilege escalation and browser hooking
OBJECTIVE: Extract, safely package, and share a malware sample from a forensic disk image

Students perform disk forensics on an infected computer. By analyzing an image the computer’s file system, the students are able to identify malware infections and to create a timeline for the attack.

OBJECTIVE:  Analyze a forensic disk image and identify indicators of compromise using Autopsy.
OBJECTIVE:  Generate a timeline of suspicious events in a forensic disk image.
OBJECTIVE:  Determine how a device was infected and what malware variant was used.

Students are asked to conclude their investigation, carried out over tasks four through seven, by compiling a timeline for the attack and writing a comprehensive report for technical and non-technical stakeholders.

OBJECTIVE: Cross-correlating information from a range of sources
OBJECTIVE: Combining information from a range of sources into a comprehensive report
OBJECTIVE: Communicating a complex story effectively to technical and non-technical audiences.

Students observe and critique a sub-optimal response to a cyber attack, and then they revise the company’s incident response plan based on lessons learned from responding to an attack.

OBJECTIVE: Recognize common errors in incident response
OBJECTIVE: Incorporate best practices into an incident response plan.

Additional Information

Prerequisites

Successful completion of the Cyber Academy: Defense course

Registration in this course is currently only available to US citizens and green card holders.

WHAT OUR STUDENTS ARE SAYING

TESTIMONIALS