Products
-
Internal Investigation
CourseDive into an advanced digital forensics investigation where you’ll analyze a system compromised through a phishing attack. The attacker gained control over the victim's system, potentially using TeamViewer for persistent access.
Free
-
ShadowMe #2 - Intro to Dynamic Analysis (HAL-JHT)
Course$20
-
ShadowMe #1 - Intro to Static Analysis (HAL-JHT)
Course$20
-
Malware Mysteries Uncovered: A Friendly Workshop for Beginners
Course$25
-
Encrypted Files Case #1
Course$50
-
Employee Policy Violation Case #2
Course5.0 average rating (1 review)Free
-
Web Server Case #3
CourseFree
-
Launching Attacks from Alternate Data Streams Case #4
CourseThis case study presents an in-depth analysis of the use of Alternate Data Streams (ADS) in Windows environments for concealing executable files, a technique commonly employed by sophisticated cyber attackers.
Free
-
Mystery Hacked System Case #5
CourseFree