Course curriculum

    1. Course Participation Agreement

    1. 1.1. Install Belkasoft X

    2. 1.2. Create a new case

    3. 1.3. Add a data source (E01 image)

    4. 1.4. Learn to use mini-timeline, global, and local filters

    1. 2.1. Cyber Kill Chain and Belkasoft Incident Investigation Model

    2. 2.2. Cyber Kill Chain model by Lockheed Martin

    3. 2.3. What is Belkasoft N and how to try it.

    4. 2.4. Check what types of incident response artifacts are supported by Belkasoft

    5. BelkaQUIZ 1

    1. 3.1. Uncovering Cyber Threat Actors' Persistence Mechanisms

    2. 3.2. Uncovering persistence mechanisms

    3. BelkaQUIZ 2.

    1. 4.1. Track potentially malicious files with evidence of execution

    2. 4.2. Execution traces

    3. BelkaQUIZ 3

    1. 5.1. Hunting for initial infection vector with Belkasoft

    2. BelkaQUIZ 4

    3. 5.2. Incident investigation practical case (video)

    4. 5.3. Uncovering Lateral Movement

About this course

  • $999.00
  • 20 lessons

Discover your potential, starting today

Grow with Belkasoft