1,800
Standard Entry-Bundle - Windows Forensics
Valid for 9 months
*Typical completion, beginning to end: 6-9 months, when studying regularly
Standard Entry-Bundle
Windows Forensics Option
A foundational course that introduces learners to fundamental concepts of cybersecurity, digital networking, and security landscape.
Series
XE Basics
Program Code
XE101
Duration
Self-Pace*
*Typical completion, beginning to end: 6-9 months, when studying regularly
Description
Intro to Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.
Tip: To enable sound, hover over the video and click the music note icon in the bottom right corner.
What Our Clients Say
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”
— John Bryce Training Center, Israel
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”
— Homeland Security
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”
— James Lim, CEO of Centre for Cybersecurity Institute, Singapore
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”
— Defense Forces
Program Recognition & Impact
This foundational program has been a cornerstone of cybersecurity training worldwide:
-
Trusted by military and law enforcement agencies for entry-level cyber training
-
Adopted by homeland security organizations for foundational cyber education
-
Used extensively in universities and corporations across multiple countries
-
Proven track record with over [X] professionals trained globally
Real-World Training Environment
From day one, you'll work in our Cyberium Arena simulator:
-
Hands-on practice with real networking tools
-
Safe environment to explore cybersecurity concepts
-
Industry-standard command line interfaces
-
Actual network monitoring and analysis tools
* Advanced threat scenarios with Specto-AI become available from Level-2 onwards
What You Will Learn
Intro to Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.
Level-1
Description
Intro-to-Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.
Module 1: Intro to Networks
This module delves into the basic of digital communication. Learners will understand digital sizes and binary, the language of computers. The module also demystifies IP addresses, differentiating between private, public, and general addresses. Furthermore, it explores network services, common protocols, DNS, and DHCP, setting a firm foundation for understanding how digital networks operate.
-
Digital Sizes
-
Binary
-
IP Addresses
-
Private Addresses
-
Public Addresses
-
General Addresses
-
Network Services
-
Services
-
Common Protocols
-
DNS
-
DHCP
Module 2: Network Security
This module offers a hands-on approach to understanding cybersecurity. Using tools such as Shodan and Google Dorks, learners will learn how to search the internet for sensitive information, demonstrating the vulnerability of digital data. The module also explores hashes, their uses, and different hash functions. Additionally, learners will familiarize themselves with encoding techniques like Hex and Base64, which play a significant role in data security.
-
Shodan
-
Searching with Shodan
-
Google Dorks
-
How Google Works
-
Basic Queries
-
Finding Sensitive Information
-
Hash
-
The Use of Hash
-
Different Hash Functions
-
Encoding
-
Hex
-
Base64
Module 3: Network Data
This module gives an in-depth understanding of network data analysis. Through hands-on practice with Command Prompt and Wireshark, students will learn how to examine and interpret network traffic. The module also introduces the OSI and TCP/IP models, integral frameworks in understanding network communication. Lastly, learners will master the use of Wireshark filters and statistics for effective data analysis.
-
Command Prompt
-
OSI and TCP/IP Model
-
Network Traffic
-
Wireshark Basics
-
Wireshark Filters
-
Wireshark Statistics
-
Description
This training is geared towards introducing the Linux environment. The Linux Basics program aims to assist users with no prior experience, enabling them to get familiar with Linux and the rudiments of automation scripting.
Module 1: Command-Line
This module presents a comprehensive guide to understanding Linux, covering topics from its historical development, various distributions, basic commands, and terminal use to more complex topics such as file permissions, text manipulation, and handling archives. It aims to provide foundational knowledge for effectively working within the Linux environment.
-
Introduction
-
History of Linux
-
Linux Distributions
-
The Terminal
-
Basic Commands
-
Permissions
-
Text Manipulation
-
Working with Archives
Module 2: Bash Scripting
This module introduces the fundamental aspects of Bash scripting, starting from basic programming principles, crafting Bash scripts, obtaining user input, and performing mathematical operations, to utilizing logic statements and manipulating environment variables. It's designed to equip learners with the necessary skills to automate tasks in a Unix-like operating system.
-
Bash Scripting
-
Introduction to Programming
-
Writing Bash Scripts
-
Getting User Input
-
Performing Math
-
Logic Statements
-
Environment Variables
Module 3: Networking
This outline provides a hands-on guide to network troubleshooting and configuring, starting from basic network problem diagnosis to package management in Linux systems. It includes practical examples of installing Debian packages and using the Advanced Packaging Tool (APT) for software management.
-
Network Troubleshooting
-
Network Configuring
-
Basic Network Troubleshooting
-
Package Management
-
Installing Deb Packages
-
Using the APT
-
Description
Python, a user-friendly language widely employed for tool creation in various domains including cybersecurity, is the focus of this program. It offers learners a foundational grasp of programming logic and equips them with the skills to write basic scripts, thereby elevating their programming proficiency to a higher level.
Module 1: Introduction to Python
This module presents an introduction to Python programming, starting from its installation, understanding variables and Booleans, to exploring more complex data types like dictionaries and tuples. It further delves into the concept of loops, essential for creating repetitive tasks and workflows in Python.
-
Introduction
-
Installing of Python
-
Variables and Booleans
-
Dictionaries and Tuples
-
Loops
Module 2: Conditions and Functions
This module delves deeper into Python programming with a focus on conditionals and loop constructs, including 'while' and 'for' loops. It then expands on scoping, subroutines, various aspects of function usage, including handling external functions and exceptions, important for robust and efficient programming.
-
Conditions
-
Conditional Statements
-
While and For Loops
-
Scoping and Subroutines
-
Functions
-
Working with Functions
-
External Functions
-
Exceptions
Module 3: Files I/O
This module guides learners through the utilization of Python modules with a focus on file handling—reading and extracting data from files and writing into them. It additionally delves into the usage of the OS module, which allows Python scripts to interact with the operating system.
-
Python Modules
-
Reading Files
-
Extracting Data
-
Writing into Files
-
The OS Module
-
Level-2
Description
The Network Research program is designed to introduce learners to the fundamental aspects of information security, employing Linux as a primary tool and providing exposure to various security threats.
Module 1: Intro to Linux
This module provides an in-depth look into virtualization, focusing on Linux. It begins with an overview of virtualization and Linux distros, guides on Linux installation, and using VMWare. It addresses network configurations, Linux administration topics like directory structures, user management, packages, file manipulation commands, and concludes with scripting and automation in Linux.-
Virtualization
-
Introduction to Virtualization
-
About Linux Distro
-
Installing Linux
-
Working with VMWare
-
Bridged vs. NAT
-
Working with Linux
-
Linux Directories
-
Linux Users
-
Packages
-
File Manipulation Commands
-
Text and File Manipulation Technics
-
Linux Scripts and Automation
Module 2: Networking
This module offers a deep dive into key networking protocols and services. It starts by exploring the TCP/IP model, followed by detailed examinations of DNS, DHCP, and ARP protocols, then transitions into network services, providing insights into the workings of SSH, FTP, and the Apache web server. This comprehensive study of networking equips learners with crucial knowledge for managing and securing digital networks.-
Protocols
-
TCP/IP Model
-
DNS
-
DHCP
-
ARP
-
Network Services
-
SSH
-
FTP
-
Apache
Module 3: Network Security
This module dives into network scanning and attack techniques. It starts with Nmap and Masscan, powerful tools for network scanning, then covers brute force and offline attack strategies. This course offers invaluable skills for network security testing.
-
Scanning
-
Nmap
-
Masscan
-
Brute Force
-
Offline Attacks
-
Creating Wordlists
-
Wireshark
-
Filtering and Parsing
-
Extracting Objects
Module 4: Cyber Security
This module delves into various network attacks and defense techniques. It covers Man-in-the-Middle (MiTM) and ARP Poisoning strategies, service brute-forcing, and analysis of cyberattacks. Learners are introduced to reverse and bind payloads, and hands-on training with Msfvenom and Msfconsole. Finally, it explores firewall operation, including port blocking and device monitoring, imparting critical skills for network security.-
Network Attacks
-
MiTM
-
ARP Poisoning
-
Service Brute-Force
-
Analyzing Attacks
-
Cyber Attack
-
Reverse and Bind Payloads
-
Working with Msfvenom
-
Working with Msfconsole
-
Firewall
-
About Firewall Operation
-
Blocking Ports
-
Monitoring Devices
-
Level-3
Description
Windows Forensics plays a crucial role in cybersecurity. Trainees will understand the data storage mechanisms of the Windows OS and acquire the skills to conduct investigations during and post cyber incidents.
Module 1: Digital Data
This module explores file and disk handling, encoding, and number systems, delving into digital sizes and SSD features. It includes hands-on training with a Hex Editor and teaches disk and file viewing techniques. The section proceeds to cover automatic carving, and methods to examine system files and metadata in Windows.
-
Files and Disks
-
Encoding
-
Number Systems
-
Digital Sizes
-
Solid State Drive (SSD) Features
-
Hex Editor
-
Working with Offsets
-
Viewing Files
-
Viewing Disks
-
Automatic Carving
-
Carving Methods
-
Automatic Carvers
-
Windows System Files
-
Metadata
-
Viewing Metadata
-
Modified Accessed Created
-
Editing Exif Data
Module 2: File Forensics
This module delves into steganography, teaching how to identify, extract, and create hidden files. It transitions into hard disk analysis, focusing on system files and Master File Table (MFT) analysis. It also imparts hands-on experience with Forensic Toolkit (FTK), a crucial tool for digital forensics. This module equips learners with vital skills in data hiding and disk analysis.
-
Steganography
-
Identify Hidden Files
-
Extracting Hidden Files
-
Creating Hidden Files
-
Hard Disk Analysis
-
System Files
-
MFT Analysis
-
Working with FTK
Module 3: Collecting Evidence
This module delves into the analysis of digital artifacts. It focuses on registry analysis, including data extraction and examination of NTUSER.DAT files. The module concludes with techniques for conducting a general search and the use of registry viewers, thereby enhancing learners' understanding of digital artifact investigation.
-
Artifacts
-
Artifact Directories
-
Browsers
-
Shadow Copies
-
Registry Analysis
-
Extracting Data
-
NTUSER.DAT Analysis
-
General Search
-
Registry Viewers
Module 4: Analysis
This module delves into the complex realms of memory, event, network, and malware analysis. It imparts key skills for inspecting computer memory, investigating system events, analyzing network interactions, and examining malicious software, thereby equipping learners with critical abilities for cyber forensics investigations.
-
Memory Analysis
-
Creating an Image
-
Working with Volatility
-
Carving Data from RAM
-
Events Analysis
-
Event Viewers
-
Setting Audit Policy
-
Custom Search
-
Network Analysis
-
Service Protocol Analysis
-
Identifying Darknet Connections
-
Malware Analysis
-
Basic Static Analysis
-
Basic Dynamic Analysis
-