
Courses

DFIR Operator Series: Track 3 - Mobile Forensics
Mobile devices are everywhere. Effectively every human is carrying a network-attached computer in their pocket. These devices present a number of difficulties for DFIR professionals. In this course series we will explore these struggles and some of their solutions to make sure we’re ready to respond effectively when incidents involve them.

DFIR Operator Series: Track 2 - Incident Response Theory
Now that you have a broad understanding of Digital Forensics and Incident Response, let’s touch base on the theory and thought processes behind effectively gathering evidence under pressure. Join SME Marc Balingit as he discusses how he handles the stress while gathering the evidence he needs thoughtfully and thoroughly.

DFIR Operator Series: Linux Forensics 101
As a cybersecurity professional, Linux is everywhere and part of our daily lives. Being prepared to respond to incidents impacting the operating system is critical. Be sure you understand the impacts on DFIR of the Linux file system, data acquisition and analysis, memory forensics, and network forensics.

DFIR Operator Series: Windows Forensics 102
One course simply isn’t enough to cover Windows Forensics. Supercharge your Windows Forensics skills further by digging into DFIR on an enterprise scale with hundreds or thousands of endpoints, proactive threat hunting to root out adversaries, memory forensics, and more.

DFIR Operator Series: Windows Forensics 101
Created for learners to analyze and triage Windows systems (including artifacts and indicators of compromise) and review Operating Systems at a detailed level. Allows learners to apply critical thinking to various steps of forensics investigations (of Windows based systems) and communicate those findings to stakeholders and executive leadership.

DFIR Operator Series: Overview Course
Get the foundation you need to continue pursuing incident response. Explore what digital forensics means, what digital evidence is, where to find it, how digital forensics can help your organization, and what’s next on your journey to becoming a DFIR professional.

Challenge: Space Mission
In this challenge, you will take on a cryptography challenge by decrypting intercepted encrypted messages. Malicious attackers use cryptography to their advantage for attacks and remaining undetected. The goal is to show how attackers can effortlessly embed data within messages to hide their activity.

Challenge: A Message Within A Message
In this challenge, you will take on a cryptography challenge by decrypting intercepted encrypted messages. Malicious attackers use cryptography to their advantage for attacks and remaining undetected. The goal is to show how attackers can effortlessly embed data within messages to hide their activity.
Marc has led, managed, and performed global incident response investigations focused on large-scale data breaches, system compromises, data exfiltration, ransomware, and malware outbreaks. He has worn many hats throughout his Incident Response career, including proactive and reactive services. Outside Blue Teaming, Marc is passionate about Vulnerability Research and Malware Analysis. He is a Technical SME at Cybrary, focusing on Threat Actors and Blue Teaming for course content.