logo

Week 9 - Incident Handling II

Week 9 - Incident Handling II
Course content
Malware Attacks Analysis
Week 9 - Kickoff
Types of Attacks
Ransomware
Computer Virus
Computer Worm
Trojan Horse
Adware
Identify the Malware
VirusTotal - Tool Introduction
How Does It Work?
VirusTotal Features
How to Use VirusTotal
Analyzing Indicators
Scenarios Introduction
Malicious File
Suspicious Website - Lab Quiz
3Questions
Suspicious Website
Suspicious Website - Lab Quiz
3Questions
Zeus and Sony Pictures Hack
Analysis Report Template
Writing Effective Cybersecurity Reports
Report Writing Playground
EDR Detection & Analysis
Introduction
Data Collection
The Power of EDR
Beyond the Buzzwords
EDR vs. SIEM
EDR In SOC
Wazuh - Tool Introduction
How Does It Work?
Wazuh’s Main Capabilities
Security Events
File Integrity Monitoring
Active Response
Vulnerability Detection
Ready, Set, Lab! - Wazuh FIM and Active Response
Week 9 - Wazuh FIM and Active Response
2Questions
Module Closure
Week 9 - Key Takeaways
Week 9 - Weekly Quiz
10Questions
Incident Handling Glossary
Summary
Tools Overview
Incident Handling Ongoing Learning

ThriveDX