Analyst will perform an actual threat hunt on a corporate network modeled after
real-world scenarios and cutting-edge malware. Analyst will propose defense
strategies as part of your evaluation.
After completing this course, Analyst will be able to understand:
- Network packet/traffic analysis
- Data enrichment with Threat Intelligence
- Data correlation
- In-depth knowledge of tools such as Wireshark, Redline & IOC editor
- IOC-based threat hunting
- Memory analysis/forensics
- Windows/Linux event analysis
- Log analysis
- Detection of any stage of the “Cyber Kill Chain” (Information
Gathering, Exploitation, Post- exploitation)