شارة ل: Detecting, Investigating and Tracking Malicious Infrastructure
Infrastructure Inspector
شارة
Infrastructure Inspector
وحدات
- Triage - Deciding when to investigate
- Interpersonal Skills for Malicious Infrastructure/Phishing Response
- Operational Security - Safe Handling of links and infrastructure
- Passive Investigation - Analyze URLs, hostnames, and IP addresses
- Passive Investigation - Analyze email headers
- Active Investigation - Analyze malicious emails
- Active Investigation - Analyze malicious webpages
- Documenting Findings
- Response - Infrastructure takedown
- Capture-the-flag exercise
شارة ل: Detecting Malware
Virus Vanquisher
شارة
Virus Vanquisher
وحدات
- Interpersonal skills for detecting malware
- OPSEC prerequisites for detecting malware
- How malware works and different types of malware
- Initial steps and checks for detecting malware
- Forensic methods on live Windows and macOS systems
- Detecting malware through traffic analysis
- Detecting malware through image acquisition (iOS, Android)
- Sample-based detection and determination
- Malicious document analysis
- Discovering where the malware came from
- Clean-up, after-care, post-incident risk management, and information sharing
شارة ل: Analyzing Malware
Forensics Fanatic
شارة ل: Web Application Security Fundamentals
Security Sage
شارة ل: Web Application Security Assessment
Exploit Explorer
شارة ل: Web Application Hardening, Forensics, and Incident Response
Gateway Guardian
شارة ل: Web Application Hardening, Forensics, and Incident Response
Gateway Guardian
شارة
Gateway Guardian
وحدات