Courses

Packed and Ransomed
In this hands-on challenge, you will practice malware triage using static and dynamic analysis techniques and tools.

Dumps, Bumps, and Jumps
In this hands-on challenge, you will practice using a SIEM to analyze possible credential access attempts during a known security incident.
Logs, Loaders, and Beacons
In this hands-on challenge, you will practice using web logs and a SIEM to analyze possible program execution, persistence, credential stealing, lateral movement, command and control (C2), and data exfiltration attempts during a known security incident.

Entry-Level Cybersecurity Training
Most of Jennifer's career has been focused on content creation in some form. As an open-source intelligence analyst, she wrote and edited short and long-form reports for business consumers. As a technical writer for the software team behind Apache NiFi, she wrote user documentation, taught in-person training courses, and created online video tutorials. As a product manager, she created product requirements, user documentation, and video demonstrations. She is currently completing her Master’s degree in Learning Design and Technology at the University of Maryland Global Campus.
