AGES 10-14

LEVEL 2: JUNIOR ANALYST

Technical Foundations. Analyze attacks. Read the logs. Defend the network.

30 HOURS LINUX & CLI FORENSICS

MISSION BRIEFING

In this level, we shift from "Awareness" to "Action". Students learn how attackers think and how systems record their tracks. We dive into real tools (Linux CLI, Packet Analyzers) to investigate phishing emails and network traffic, preparing them for the role of a Blue Team defender.

TRAINING MODULES

  • Overview of modern cyber threats & attack types.
  • Roles of the "Blue Team" (Defenders) in SOCs.
LABS:
Incident Analysis Attack Classification

  • Navigating Linux via CLI (Command Line).
  • Reading and filtering system Log files.
LABS:
Extract Attacker IP Find Hidden Credentials

Deep dive into email headers to trace scam origins.

LABS:
Header Investigation URL Reputation Check

How data moves? Using Wireshark (simulated) to capture traffic.

LABS:
Follow TCP Streams Capture Credential

🏁 FINAL EXAM

Solve multi-scenario puzzles under time pressure.

Log + Web Challenge Network Hunt

SKILLS UNLOCKED


Logs Forensics

Linux CLI

Packet Analysis

CTF Solving

READY FOR OPS?

ENROLL ANALYST