Email Header Analysis
This situation deals with a possibly fraudulent email and walks through the steps you should take to analyze email headers and how to identify bad actors.
This situation deals with a DDoS attack on a company. Your goal is to analyze the victim’s logs, find which IP addresses are bots, serve legal processes, and identify perpetrator(s).
This situation deals with an insider threat. Your job is to search, analyze, and match unusual system log activities and find the IP that intruded upon the system.
Learn more about cyber careers in the Federal Bureau of Investigation.
Learn More About Cyber Skills
Follow some of the links below to learn more about cybersecurity, privacy, forensics, and more