Don't second guess. Go with experience.

This event has passed

Intro to Profiling and Investigation

CyberDefenses Academy




Jul 20 - 1 day



Delivery Method



Certification of Completion

Audience / Level





Laptop required

Course Details

Program Introduction

This class is an introduction to the details and methods of profiling and investigation. Investigation should be considered quite simply as a systematic fact finding and reporting process. Profiling is looking at the facts and making a best guess as to the type of individual, object or event acted in relation to the facts. If the event was X stole data from company Y, investigation would determine the facts, while profiling would try to ascertain X. Both would be used to determine the tools, tactics, techniques and procedures employed.

Students are introduced to the concepts and walked through practical applications of each via a series of labs. The course capstone is an organized discussion and dissection of a case study on profiling adversaries.

Course Objectives

  • It’s designed for those with a background in threat intelligence with a need for greater understanding profiling and investigation techniques.
  • It conveys the necessary concepts, principles and terms to lay down a solid foundation.
  • It is a comprehensive course for those with and interest in profiling and investigation.

Target Student

  • Individuals new to or desiring a better understanding of Profiling and Investigation.
  • Professionals who deal with technical issues, but feel they do not have enough background in investigating and forming profiles.
  • Technical professionals that need to be armed with greater knowledge of incident response, investigation, profiling, and their role in resolving incidents.


Monty St John
Monty St John is a computer science and information security expert, U.S. Navy and U.S. Air Force veteran, certified instructor, and author of dozens of classes for CyberDefenses. He has assisted numerous companies build and accredit laboratories, threat teams, and security operations centers. He’s also a prolific writer with two upcoming technical volumes set for 2018; Game Designer and Speaker. Learn more about Monty St John.

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Open and operate browsers
    • Find and use command line
    • Execute scripts
  • Prior threat intelligence, incident response, infosec, or forensics experience a plus
  • Understanding of virtual machines (VM) and how to use one.
    • Understand how to import and power on a VM

Course Outline

  • Introduction
  • Investigation
    • The Basics
    • Searching
    • Information processing
    • Knowledge discovery
  • Profiling
    • Overview
    • Process, step-by-step
    • People, Objects, Events
    • Profile types
      • Individual
      • Group
    • How they are used in security & intelligence
  • Case Study: Profiling Adversaries
  • Wrap-up & Close

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.