Cyber Fire Classes

Network Archaeology

In this course, you will learn how to take a packet capture file containing an unknown custom binary protocol, and extract encoded/obfuscated payloads into decoded command and control and file transfer traffic.

Details and laptop configuration requirements

Host Forensics

This course primarily focuses on volatile memory based forensics. Beginning with an overview of forensics, we dive into forensic techniques for rapid incident response, with a focus on understanding from a conceptual level, not just following recipes.

Details and laptop configuration requirements

Malware Analysis

Determining what software does without having to run anything is the core skill of Malware Analysis: we use this to report on malicious software (Malware) without further compromising computation resources by infection. Students analyze malware using static and dynamic analysis techniques, and learn to monitor the actions of executing malware and extract indicators of compromise.

Details and laptop configuration requirements

Incident Coordination

Technical response is pointless without effective communication. This course introduces participants to strategies and techniques for effective incident management

Details and laptop configuration requirements

Operational Technology

Operational Technology (OT) operates in every industry and with this convergence, OT has become a critical component that effect all different types of cyber professionals, including incident responders, security operations center staff, red team, penetration testers, and cyber analysts looking to gain an understanding of OT cyber assurance. This course is an introductory course to OT cyber principles, practices and forensics.

Details and laptop configuration requirements

Entry Point

Entry Point provides an overview of all four classes, explaining terms and concepts, and allowing participants to explore some of the technical aspects of the Cyber Fire incident response model, without going into the extreme depth provided by the other classes.

Details and laptop configuration requirements

Time outside of class

Networking with peers is useful for the puzzle contest held after this course and making contacts outside your organization proves useful to many people after they return to work. Breaks during classes and the contest provide good opportunities to meet new people. Social events are usually held in the evenings once or twice during the week. Lunch is usually on your own unless otherwise listed on the schedule.