This course introduces the tools common to a defender's work environment, and packs in all the essential explanations of tools, processes, and data flow that every blue team member needs to know. you will learn the stages of security operations: how data is collected, where it is collected, and how threats are identified within that data. The class dives deep into tactics for triage and investigation of events that are identified as malicious, as well as how to avoid common mistakes and perform continual high-quality analysis. Students will learn the inner workings of the most popular protocols, and how to identify weaponized files as well as attacks within the hosts and data on their network.
כדי להטמיע, העתיקו את כתובת האינטרנט והדביקו באתר וורדפרס
כדי להטמיע, יש להעתיק ולהדביק את הקוד לאתר