Analyze malicious network traffic
Analyze a remote intrusion attempt
Investigate an incident using a SIEM
Compile indicators of compromise to guide forensic analysis
Examine a compromised host’s memory
Conduct a forensic disk examination
Close your investigation
Critique the response to a cyber incident
Reverse engineer a suspicious file
Reverse engineer a complex suspicious file
Reverse engineer a still more complex suspicious file
Investigate hacker group
Exploit a server
Exploit a better protected computer
Improve off-the-shelf malware
Write your own shellcode payload
Spearphish a company
Hack a database and exfiltrate data
Hack a foreign intelligence service