Course curriculum

  • 1

    Introduction to Cyber Defence

  • 2

    Understanding Adversary Tactics

    • The Bad Pyramid

    • Collaboration Between Red and Blue Teams

  • 3

    Roles and Responsibilities in Cyber Operations

    • Primary Roles and Responsibilities

  • 4

    Cyber Threat Landscape and Frameworks

    • Understanding the Cyber Threat Landscape

    • Overview of MITRE ATT&CK Framework and Atomic Red Team

  • 5

    Log Analysis and Threat Detectio

    • Log Analysis Using Splunk

    • Custom Log Analysis with Splunk

  • 6

    Introduction to Malware Analysis

    • Introduction to Malware and Its Analysis

    • Static and Dynamic Malware Analysis

    • Malware Analysis Using VirusTotal

  • 7

    Malware Analysis Techniques and Tactics

    • Malware Analysis: Techniques, Tactics, and Behaviors (Part 1)

    • Malware Analysis: Techniques, Tactics, and Behaviors (Part 2)

  • 8

    Malware Analysis Process

    • Step-by-Step Malware Analysis Process

  • 9

    Network and File-Based Malware Analysis

    • Malware Analysis at the Network Layer

    • Decompiling Malware

    • Decompiling Malware Using PCAP Files