Learning path
Advanced Endpoint Investigations
Modern threats don’t stop at logs and neither should you. This path prepares analysts to investigate across real world endpoints using disk images, memory dumps, and OS specific artifacts. With guided labs and challenge rooms, you’ll develop the skills to pivot between operating systems, uncover hidden attacker behavior, and respond with confidence under pressure.
hard
Investigate endpoint threats across Windows, Linux, macOS, and mobile platforms using memory, disk, and file system forensics.
- Master Windows, Linux, macOS, mobile and disk investigation techniques
- Investigate live memory and cold disk images for signs of compromise
- Learn file system analysis and forensics with hands-on labs covering MBR, GPT, FAT32, NTFS, EXT and file carving
- Use tools like Volatility, KAPE, SleuthKit, and ALEAPP in real world scenarios

Complete this learning path and earn a certificate of completion.
Introduction
Section 1
File System Analysis
Section 2
Linux Endpoint Investigation
Section 3
Windows Endpoint Investigation

Section 4
macOS Forensics
Section 6
Memory Analysis
Section 7
Disk Image Analysis
