Study real-world data, not example data sets.
Real World Attack Artifacts
The Arizona Cyber Warfare Range hosts ongoing cyber warfare activities at all levels of experience. This affords the opportunity for students interested in developing and expanding their forensic skills to evaluate the results of cyber attacks, because a key part of defense is understanding prior failures and uncovering details of cyber attacks and subsequent breaches.
The forensic cases developed at the Arizona Cyber Warfare Range are from actual events, not a canned forensic image. Therefore, while most cases have been created by an aggressor following a process, there is always variance in the actual forensic data created. This variance ensures the best possible experience for the forensic technician because no two cases are exactly the same.