FIND THE RIGHT FIT
WHO SHOULD ENROLL
Students who have successfully completed The Cyber Academy: Defense and who want to learn more about the “attack side” of cyber security and cyber operations.
Cyber Defender 2 focuses on the skills of memory and disk forensics, reporting, and responding to cybersecurity incidents. Acquiring these skills expands a graduate’s career possibilities to include digital forensics analyst and incident responder. This course takes place over 10 weeks at a rate of 15 hours per week.
Beginner
10 Weeks at 15 Hours per Week
Included with Course Purchase
A Pre-Assessment is Required
No dates are scheduled at this time, please contact us to apply today!
Students who have successfully completed The Cyber Academy: Defense and who want to learn more about the “attack side” of cyber security and cyber operations.
START DATE |
PACE |
CAMPUS |
STATUS |
AUGUST 7, 2023 |
Full-time |
Online |
Few spots left! |
AUGUST 7, 2023 |
Full-time |
Online |
Few spots left! |
AUGUST 7, 2023 |
Full-time |
Online |
Few spots left! |
AUGUST 7, 2023 |
Full-time |
Online |
Few spots left! |
You’re ready to commit to a full-time course load. You’ll graduate in 15 weeks thanks to a rigorous schedule: 8 hours a day, Monday to Friday.
Our part-time course is designed for busy people. If you don’t have 8 free hours to dedicate a day (same), then our part-time course is for you.
We have teamed up with Meritize to offer our students a unique financing option. Meritize works with students, educators, and employers to help people succeed in skills-based careers. Want to learn more? Check out their FAQ page here, or give them a call at 833-MERIT-4-U. Ready to see if you qualify? Check your options.
Cyber Defender 2 focuses on the skills of memory and disk forensics, reporting, and responding to cybersecurity incidents. Acquiring these skills expands a graduate’s career possibilities to include digital forensics analyst and incident responder.
If you cannot commit to enrolling into a program in its entirety, all of the courses from our programs, including Cyber Defender 2, are available for purchase individually.
Students perform forensics examination of a memory image taken from a computer to identify sophisticated malware that infected the device.
OBJECTIVE: Acquire a working knowledge of process structures in memory using Volatility
OBJECTIVE: “Know normal to find evil”
OBJECTIVE: Formulate plan for a memory forensics investigation
OBJECTIVE: Recognize malware “footprints” in a forensic memory image
OBJECTIVE: Locate a malicious binary in a forensic memory image
OBJECTIVE: Corroborate findings with other sources such as [Splunk] SIEM logs
OBJECTIVE: Identify malware actions such as privilege escalation and browser hooking
OBJECTIVE: Extract, safely package, and share a malware sample from a forensic disk image
Students perform disk forensics on an infected computer. By analyzing an image the computer’s file system, the students are able to identify malware infections and to create a timeline for the attack.
OBJECTIVE: Analyze a forensic disk image and identify indicators of compromise using Autopsy.
OBJECTIVE: Generate a timeline of suspicious events in a forensic disk image.
OBJECTIVE: Determine how a device was infected and what malware variant was used.
Students are asked to conclude their investigation, carried out over tasks four through seven, by compiling a timeline for the attack and writing a comprehensive report for technical and non-technical stakeholders.
OBJECTIVE: Cross-correlating information from a range of sources
OBJECTIVE: Combining information from a range of sources into a comprehensive report
OBJECTIVE: Communicating a complex story effectively to technical and non-technical audiences.
Students observe and critique a sub-optimal response to a cyber attack, and then they revise the company’s incident response plan based on lessons learned from responding to an attack.
OBJECTIVE: Recognize common errors in incident response
OBJECTIVE: Incorporate best practices into an incident response plan.
Successful completion of the Cyber Academy: Defense course
Registration in this course is currently only available to US citizens and green card holders.