logo

Chapter 10 - Incident Handling II

Chapter 10 - Incident Handling II
Course content
Chapter Kick-off
Incident Handling II Chapter Kick-off
Malware Attacks Analysis
Types of Attacks
Ransomware
Computer Virus
Computer Worm
Trojan Horse
Adware
VirusTotal - Tool Introduction
How Does It Work?
VirusTotal Features
How to Use VirusTotal
Analyzing Indicators
Scenarios Introduction
Malicious File
Suspicious Website
Zeus and Sony Pictures Hack
Analysis Report Template
Writing Effective Cybersecurity Reports
Report Writing Playground
EDR Detection & Analysis
Endpoint Detection & Response
EDR Key Components
EDR Data Collection
EDR In SOC
EDR Phases
Detection
Triage
Remediation
Differences Between AV and EDR
Differences Between SIEM and EDR
The Importance of EDR
Beyond the Buzzwords
How Does It Work?
Wazuh’s Main Capabilities
Security Events
File Integrity Monitoring
Active Response
Vulnerability Detection
Ready, Set, Lab! - Wazuh FIM and Active Response
Chapter Closure
Incident Handling II Quiz
10Questions

TechDX