In this module, you will handle real-world incidents composed of different Tactics, Techniques, and Procedures (TTPs), starting from initial access to data exfiltration. You will learn how to handle different artefacts, including memory dumps, email samples, packet captures, and event logs. Additionally, you will learn how to navigate different data sources ingested in an SIEM and correlate the significant findings to complete the investigation.
Loading rooms...
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).