logo

Week 8 - Incident Handling I

Week 8 - Incident Handling I
Course content
Introduction
Module Introduction
Week 8 - Kickoff
What Are HTTP Headers?
HTTP Headers Fundamentals
URL and URI
URL Encoding
HTTP Request Header Types
Keywords
Events and Security Incidents
Understanding the Difference
Attack Vectors
Stay Ahead of the Game
Alerts and Sources
Incident Severity
False-Positive and False-Negative
The Challenge of Security Alerts
What is SOC?
The importance of the SOC
The Defenders
Responsibilities and Roles
SOC Deployment Models
Deployment Scenarios
Incident Analysis Best Practices
Web Attacks Analysis
Types of Attacks
DoS and DDoS
SQL Injection
Cross-Site Scripting (XSS)
Command Injection
Local File Inclusion (LFI)
Recap on Web Attack Incidents
Web Attacks Cheat Sheet
Incident Analysis
Ready, Set, Lab! - Detecting with Splunk
Week 8 - Detecting with Splunk
2Questions
Ready, Set, Lab! - SQL Injection Investigation
Week 8 - SQL Injection Investigation
2Questions
Ready, Set, Lab! - Web Injection
Week 8 - Web Injection
2Questions
Domain Attacks Analysis
Types of Attacks
Typosquatting
Domain Hijacking
Pass the Hash
Pass the Ticket
LDAP Reconnaissance
Brute-Force
Wireshark Cheat Sheet
Ready, Set, Lab! - Domain Breach Investigation
Week 8 - Domain Breach Investigation
2Questions
Ready, Set, Lab! - Domain Intrusion Investigation
Week 8 - Domain Intrusion Investigation
2Questions
Module Closure
Week 8 - Weekly Quiz
10Questions
Week 8 - Key Takeaways
Your Career Guide to Success
Resume Recipe for Success

ThriveDX