Level: Intermediate

Duration: 64 hours

Table of Content:

  • Introduction
  • Lab Setup
  • Cyber Attack Operations
  • Memory Threat Hunting on Windows
  • Memory Threat Hunting on Linux           
  • Common Application Forensics
  • Linux Forensics
  • Miscellaneous