Advanced Enterprise DFIR

Current Status

Not Enrolled

Price

Closed

Get Started

Analyst II: Advanced DFIR Track

This course is included in the Analyst 2 – DFIR Training Track and Hero Bundle Training. Enroll to access the course.


> View Course Syllabus 

 

Support & FAQs

Please use our Support & FAQ page to find more information and reach out to us and join our Discord community for general conversation topics and networking.

Important: Virtual Labs

  • Your lab VM is a Windows virtual machine in the cloud. This means it may take a few minutes until they are started up and available.
  • Whenever you have less than 15 minutes remaining, you will have the option to extend your lab by 1 hour.
  • VMs are persistent. When a lab VM is stopped, it will be stored and you can resume the VM at a later point.
  • Terminating a VM will destroy the VM and data will be lost.
  • For the best experience, it’s recommended to use Google Chrome where you will have copy and paste functionality.

Tools Used

Splunk, Velociraptor, Plaso, Timesketch, Yara, Sigma, Wireshark, Zeek, Volatility3, CyberChef, EricZimmerman Tools, bulk_extractor, Hayabusa, PEStudio, BrowsingHistoryView

Certificate of Completion

Once you finish the course you will receive your Certificate of Completion!

 

Average Review Score:
★★★★★
DFIR 301
★★★★★

I just finished the 301 Advanced Enterprise DFIR course and honestly loved it.
The content was clear, well-structured, and surprisingly engaging. The explanations were easy to follow without oversimplifying anything, and the hands-on parts really helped tie everything together. It’s definitely one of the most solid and interesting DFIR courses I’ve taken so far.
Highly recommend.

You must log in and have started this course to submit a review.

Course Content

Course Logistics
301 Online Lab VM
Ransomware Response
Threat Landscape: Ransomware Attacks
Incident Analysis: Core Techniques and Approaches
Incident Management: Documenting Findings and Creating Timelines
Scenario Introduction
Case: Ransomware Scenario
Investigation Timeline
Timeline Template and Notes Taking
1) Network Traffic Analysis
PCAP and Zeek Introduction
Network Traffic Analysis Findings
2) Log Analysis
Log Analysis Introduction
Log Analysis Conclusion
3) Remote Threat Analysis
4) Forensic Analysis
Forensic Analysis 2 Topics
Data Collection 2 Topics
5) Malware Analysis
Malware Collection and Analysis Introduction
PE Files Analysis 2 Topics
6) Timeline Analysis
7) Self-Guided Timeline Investigations
Investigation Introduction and Objectives
Preparation: Splunk Timeline Analysis
Preparation: TimeSketch Timeline Analysis
Execution: Timeline Analysis Guide
8) Post-Incident Activities
Reporting & Findings 3 Topics
Conclusion
Attack Scenario Reveal
Course Conclusion and Next Steps
Scroll to Top

Training Waitlist

Join our waitlist and get notified when training becomes available.

Contact Information
Professional Experience
I'm interested in

*By submitting this form, you’re agreeing that we will contact you and to receive our free email newsletter. (You’ll never be spammed and you can unsubscribe at any time.) We do not share your information with third-parties.