Description
Size: 11.1 GB
WHO SHOULD TAKE THIS COURSE
- Incident Responders
- SOC Analysts
- Digital Forensic Investigators
- Network Threat Hunters
- Information Technology/Security enthusiasts wanting to expand their knowledge on network traffic analysis
KEY TAKEAWAYS
- Learn fundamental concepts of incident handling and response
- Gain insight into attacker methodologies and learn various techniques to uncover adversarial activity
- Learn how to detect network protocol abuse against common protocols found in enterprise environments
- Students will get hands-on experience:
- Analyzing network packet captures with a variety of tools, techniques, and filtering options
- Extracting files and metadata from network packet captures
- Creating custom Zeek scripts to support incident response efforts
- Creating custom Zeek scripts for Zeek log enrichment
- Analyzing network flow data
- Real-world attack scenarios and techniques for response
- Methods to aid investigators when dealing with the challenges of encrypted communications
- A culminating CTF challenge combining all course learning objectives