The list below contains online courses that I have either personally taken or plan to take.
For more training, see the Free and Affordable Training site.
- Udemy
- Hands-On Incident Response Analysis**
- Network Security Analysis Using Wireshark, Snort, and SO**
- CompTIA CySA+ (CS0-001) Complete Course and Practice Exam
- Computer Hacking Forensic Investigator(CHFIv9) Practice Exam**
- Cisco CCNA Cyber Ops: The Complete Course**
- CCNA Cyber Ops 210-250 (SECFND) + Kali Linux Hacking Tools **
- The Complete Splunk Beginner Course
- The Complete Splunk Enterprise Certified Admin Course
- Cyber Security Incident Response Wannacry Ransomware
- Linux Academy
- Introduction to Python Development**
- Programming Use Cases with Python**
- CompTIA Cybersecurity Analyst (CySA+)
- Kali Linux Deep Dive
- Linux Foundation Certified System Administrator (LFCS)
- Certified Entry-Level Python Programmer Certification (PCEP)
- Splunk Deep Dive
- Zero2Automated
- Malware Reverse Engineering Bundle
- Pluralsight
- Cybrary
- Intro to Malware Analysis and Reverse Engineering**
- Incident Response and Advanced Forensics**
- Introduction to SIEM Tools**
- Windows Forensics and Tools**
- Stealth Techniques for Incident Handlers**
- Attacks and Persistence for Incident Handlers**
- EH Academy
- Computer Forensics & Investigation : Using Open Source Tools**
- Project Ares
- Battle Room: Forensics**
- Battle Room: Scripting Fundamentals**
- Battle Room: System Security Analyst**
- Battle Room: Network Traffic Analysis**
- Battle Room: Linux Basics**
- Media Center: Defensive Specialization**
- Game Room: Regexile**
- Python Institute
- Python Essentials Parts 1 & 2**
- Splunk
- Splunk Fundamentals 1**
- Splunk User Behavior Analytics
- SANS
- FOR498: Battlefield Forensics & Data Acquisition
- FOR500: Windows Forensic Analysis**
- FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
- FOR518: Mac and iOS Forensic Analysis and Incident Response
- FOR526: Advanced Memory Forensics & Threat Detection
- FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
- FOR578: Cyber Threat Intelligence
- FOR585: Smartphone Forensic Analysis In-Depth
- FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
**These are courses that I have personally taken so far.
For more training options (in person and online), check out DFIR Training and AboutDFIR.
In order to help with the cost of running this website, I became an affiliate of some of the training platforms I like (TCM Security, INE, DFIR Science, Pluralsight). Links to those platforms are partner/affiliate links.
Recent Comments