CSIH practice exam
Custom practice exam | 30 questions
Prepare for your CSIH exam and test your domain knowledge.
Network Traffic Analysis Cyber Range
Cyber range | 12 labs
Gain practical experience and build your real-world network traffic analysis skills through 12 hands-on labs in the Network Traffic Analysis Cyber Range.
Building Incident Response Team
Course | 31 minutes
Review the most important aspects of incident response team members, such as technical skills, personal skills and critical knowledge.
Reverse Engineering Concepts
Course | 33 minutes
Get to grips with the details of reverse-engineering concepts in this three-video course. Includes demonstration and tool lists.
Cell Phone Forensics
Course | 28 minutes
Refresh your knowledge of cell phone forensics with this course covering Andriod and iPhone forensics challenges and best practices.
Windows Swap File
Course | 27 minutes
Get familiar with the Windows swap file, a great place for evidence to hide. Includes tools and demonstration video.
Memory Forensics
Course | 1 hour 19 minutes
Two videos take you through the fundamentals of memory forensics, including tools, techniques for dumping memory and an in-depth demonstration.
Dealing with Passwords and Encryption
Course | 33 minutes
Deal with passwords and encryption with the help of this course covering password-cracking, public and private keys, Kerberos and more.
Disk Forensics
Course | 55 minutes
Dive into disk forensics with this course covering bit images, restoring disk images, slack, steganography and more.
Role of the Computer Forensic Examiner
Course | 40 minutes
Get to grips with the role of the computer forensics examiner, including duties and potential legal concerns.
Cyber Attacks Overview
Course | 1 hour 14 minutes
Review the fundamentals of cyberattacks with two videos on risks, attack types and the anatomy of an attack.
Incident Response Process
Course | 1 hour 1 minute
Six videos take you through the details of the incident response process, including important tools, policies, strategies and legal concerns.
Introduction to Incident Response
Course | 56 minutes
Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.
Stages of Incident Response
Course | 1 hour
Review the stages of incident response in two separate models, covering the details and concerns for each phase.
Email Analysis
Course | 21 minutes
Explore forensic email analysis with this course covering the structure, function and details of email.
Web Traffic Analysis
Course | 13 minutes
Dig into Web traffic analysis with this course covering write protection, Web forensics and cookies.
Wireless Analysis
Course | 38 minutes
Take a moment to refresh your knowledge of wireless analysis. Includes vocabulary, examples and diagrams.
Protocol Analysis
Course | 19 minutes
Get to grips with protocol analysis through this course on TCP/IP concepts, routing, vocabulary and functions.
Log Analysis
Course | 39 minutes
Log analysis counts for a lot in an investigation. Learn to maximize your analysis process with this course covering log management, auditing, steps, concerns and more.
Network Security Technologies
Course | 30 minutes
Two videos reintroduce you to network security technologies, including tool families, uses and examples.
Network Forensics Concepts
Course | 50 minutes
Develop your knowledge of network forensics concepts, tools and techniques as you progress through this five-video course.
Networking Fundamentals
Course | 31 minutes
Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.
CSIH practice exam
Custom practice exam | 30 questions
Prepare for your CSIH exam and test your domain knowledge.
Network Traffic Analysis Cyber Range
Cyber range | 12 labs
Gain practical experience and build your real-world network traffic analysis skills through 12 hands-on labs in the Network Traffic Analysis Cyber Range.
Building Incident Response Team
Course | 31 minutes
Review the most important aspects of incident response team members, such as technical skills, personal skills and critical knowledge.
Reverse Engineering Concepts
Course | 33 minutes
Get to grips with the details of reverse-engineering concepts in this three-video course. Includes demonstration and tool lists.
Cell Phone Forensics
Course | 28 minutes
Refresh your knowledge of cell phone forensics with this course covering Andriod and iPhone forensics challenges and best practices.
Windows Swap File
Course | 27 minutes
Get familiar with the Windows swap file, a great place for evidence to hide. Includes tools and demonstration video.
Memory Forensics
Course | 1 hour 19 minutes
Two videos take you through the fundamentals of memory forensics, including tools, techniques for dumping memory and an in-depth demonstration.
Dealing with Passwords and Encryption
Course | 33 minutes
Deal with passwords and encryption with the help of this course covering password-cracking, public and private keys, Kerberos and more.
Disk Forensics
Course | 55 minutes
Dive into disk forensics with this course covering bit images, restoring disk images, slack, steganography and more.
Role of the Computer Forensic Examiner
Course | 40 minutes
Get to grips with the role of the computer forensics examiner, including duties and potential legal concerns.
Cyber Attacks Overview
Course | 1 hour 14 minutes
Review the fundamentals of cyberattacks with two videos on risks, attack types and the anatomy of an attack.
Incident Response Process
Course | 1 hour 1 minute
Six videos take you through the details of the incident response process, including important tools, policies, strategies and legal concerns.
Introduction to Incident Response
Course | 56 minutes
Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.
Stages of Incident Response
Course | 1 hour
Review the stages of incident response in two separate models, covering the details and concerns for each phase.
Email Analysis
Course | 21 minutes
Explore forensic email analysis with this course covering the structure, function and details of email.
Web Traffic Analysis
Course | 13 minutes
Dig into Web traffic analysis with this course covering write protection, Web forensics and cookies.
Wireless Analysis
Course | 38 minutes
Take a moment to refresh your knowledge of wireless analysis. Includes vocabulary, examples and diagrams.
Protocol Analysis
Course | 19 minutes
Get to grips with protocol analysis through this course on TCP/IP concepts, routing, vocabulary and functions.
Log Analysis
Course | 39 minutes
Log analysis counts for a lot in an investigation. Learn to maximize your analysis process with this course covering log management, auditing, steps, concerns and more.
Network Security Technologies
Course | 30 minutes
Two videos reintroduce you to network security technologies, including tool families, uses and examples.
Network Forensics Concepts
Course | 50 minutes
Develop your knowledge of network forensics concepts, tools and techniques as you progress through this five-video course.
Networking Fundamentals
Course | 31 minutes
Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.