The IACD houses hundreds of cyber skill experiences and content to drive human cyber readiness for security analysts, incident responders and threat hunters. And we’re always adding more powered by the very latest threat intelligence. Our hands-on labs and challenges are designed to move teams and individuals through a four phase process to power up your organisation’s human cyber readiness.
Cyber Defence: Defensive (Advanced)
When a host is compromised, it is important to perform a forensic investigation to see the extent of the compromise. These investigations can be done remotely, on a shut down disk or on a live running machine.
Once an attack has occurred and there has been indication of a compromise, an Incident Response Analyst will investigate what caused the compromise and the effect it has had on the system. There are many different signs of compromise and one must know as many as possible.
SOC analysts and blue teams across the world will analyze logs to understand interactions between their networks and an attacker. It is a skill to be able to identify relevant information quickly and efficiently.
In the world of threat hunting, an investigator needs to understand both what a false positive and compromised route is. This series takes you through many concepts and tools used by industry professionals to prepare for possible attacks.
Reverse engineering is one of the hardest but ultimately rewarding skills in cybersecurity. By completing this series of labs, you will gain hands- on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact.
Malware never stops developing, and neither should your malware analysis skills and threat awareness. In this series, you will be introduced to a variety of industry-standard tools used to analyse malicious samples.
Coding and Security
Writing secure code is critical to securing devices and software applications, including both external and internal versions. This is a large skillset incorporating exercises in many languages, as well as reverse engineering challenges.