top of page

Course Overview

The IACD houses hundreds of cyber skill experiences and content to drive human cyber readiness for security analysts, incident responders and threat hunters. And we’re always adding more powered by the very latest threat intelligence.  Our hands-on labs and challenges are designed to move teams and individuals through a four phase process to power up your organisation’s human cyber readiness.

Cyber Defence: Defensive (Advanced)

R33 300,00Price
  • Digital Forensics

    When a host is compromised, it is important to perform a forensic investigation to see the extent of the compromise. These investigations can be done remotely, on a shut down disk or on a live running machine.


    Once an attack has occurred and there has been indication of a compromise, an Incident Response Analyst will investigate what caused the compromise and the effect it has had on the system. There are many different signs of compromise and one must know as many as possible.

    Log Analysis

    SOC analysts and blue teams across the world will analyze logs to understand interactions between their networks and an attacker. It is a skill to be able to identify relevant information quickly and efficiently.

    Threat hunting

    In the world of threat hunting, an investigator needs to understand both what a false positive and compromised route is. This series takes you through many concepts and tools used by industry professionals to prepare for possible attacks.

    Reverse Engineering

    Reverse engineering is one of the hardest but ultimately rewarding skills in cybersecurity. By completing this series of labs, you will gain hands- on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact.

    Malware Samples

    Malware never stops developing, and neither should your malware analysis skills and threat awareness. In this series, you will be introduced to a variety of industry-standard tools used to analyse malicious samples.

    Coding and Security

    Writing secure code is critical to securing devices and software applications, including both external and internal versions. This is a large skillset incorporating exercises in many languages, as well as reverse engineering challenges.

bottom of page