Course Overview
The IACD houses hundreds of cyber skill experiences and content to drive human cyber readiness for security analysts, incident responders and threat hunters. And we’re always adding more powered by the very latest threat intelligence. Our hands-on labs and challenges are designed to move teams and individuals through a four phase process to power up your organisation’s human cyber readiness.
Cyber Defence: Defensive (Advanced)
Digital Forensics
When a host is compromised, it is important to perform a forensic investigation to see the extent of the compromise. These investigations can be done remotely, on a shut down disk or on a live running machine.
IncidentResponse
Once an attack has occurred and there has been indication of a compromise, an Incident Response Analyst will investigate what caused the compromise and the effect it has had on the system. There are many different signs of compromise and one must know as many as possible.
Log Analysis
SOC analysts and blue teams across the world will analyze logs to understand interactions between their networks and an attacker. It is a skill to be able to identify relevant information quickly and efficiently.
Threat hunting
In the world of threat hunting, an investigator needs to understand both what a false positive and compromised route is. This series takes you through many concepts and tools used by industry professionals to prepare for possible attacks.
Reverse Engineering
Reverse engineering is one of the hardest but ultimately rewarding skills in cybersecurity. By completing this series of labs, you will gain hands- on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact.
Malware Samples
Malware never stops developing, and neither should your malware analysis skills and threat awareness. In this series, you will be introduced to a variety of industry-standard tools used to analyse malicious samples.
Coding and Security
Writing secure code is critical to securing devices and software applications, including both external and internal versions. This is a large skillset incorporating exercises in many languages, as well as reverse engineering challenges.