The Incident Responder Career Path gives guidance, knowledge, and proficiency in the core skills necessary for a career as a Cyber Defense Incident Responder.

Feel confident you are learning with the best

After having helped grow the careers of 2.5 million cybersecurity professionals around the world and individuals from thousands of companies, be rest assured you are choosing the right program from a provider with the track-record to show for it.

video cyb icon

Work through a structured career path curated by experts and tied directly to popular industry job roles

virtual lab icon cyb

Use virtualized, hands-on experiences to learn by doing gaining practical, real-world skills

resume prep cyb icon

Track your progress as you move closer to your goal with each learning session

chat icon cyb

Be confident you’re ready for the next step of your career journey upon completion


Vulnerability Scanner Set-up and ConfigurationCreating Recommendations Based on Vulnerability AssessmentsCompTIA SY0-501: Security+CompTIA Security+ 501Host Data Integrity BaseliningPerform a Network Vulnerability Assessment Using NmapIdentify Non-secure Network Traffic Event Log CollectionLog CorrelationLog Correlation & Analysis to Identify Potential IOCConduct Log Analysis and Cross Examination for False PositivesLog Event ReportsWiresharkApplying Filters to TCPDump and WiresharkCompTIA CySA+Parse Files Out of Network TrafficParticipate in Attack Analysis Using Trusted Tool SetNetwork MinerPerforming Incident Response in a Windows EnvironmentMonitoring Network Traffic for Potential IOA/IOCMonitoring Network TrafficWindows Event Log Manipulation via Windows Event ViewerCentralized MonitoringCreating SIEM Reports with SplunkCreating a Baseline Using the Windows Forensic Toolchest (WFT)Identify Attack TypesIdentify Rootkit and DLL Injection ActivityIdentify and Remove Trojan Using Various ToolsIdentify Whether High-Risk Systems Were AffectedIdentifying Intrusion and Mitigating Attacks with RHEL ServerIdentifying Malicious Network ConnectionsCheck for Indicators of Other Attack Activity (Debug PE File)Analyze SQL Injection AttackAnalyze Various Data Sources to Confirm Suspected InfectionAnalyze and Classify MalwareAnalyze Malicious Activity in Memory Using VolatilityAnalyze Structured Exception Handler Buffer Overflow ExploitMicrosoft Baseline Security AnalyzerUse pfTop to Analyze Network TrafficUsing PowerShell to Analyze a SystemWebApp Attack PCAP AnalysisThreat DesignationManually Analyze Malicious PDF DocumentsManually Analyze Malicious PDF Documents 2RootKitRecover from SQL Injection AttackRecover from Web-Based Flashpack IncidentRespond to Cyber Espionage Against Overseas Corporate Assets in TaiwanPost Incident Service Restoration

The Career Path will have a structured curriculum with specialized learning activities that will give you real-world training on Log Collection and Analysis, Data Acquisition and Analysis, Malware Identification and Analysis, Threat Intelligence, Incident Response and Recovery, and Vulnerability Identification and Analysis. The program is also aligned with the NIST Cybersecurity Framework, and you will learn how to be a Cyber Defense Incident Responder that investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Enroll Now

Program Starts On February 12th