Security Analysis
0 courses
0 hours
This hands-on course equips participants with advanced skills in network and system monitoring, threat detection, and analysis. Learn to monitor application services, configure alerts, and detect anomalies using tools like Wireshark and Nagios. Explore covert channel detection, DNS traffic analysis, and real-time system monitoring. Gain practical experience with file analysis, sandboxing, YARA rule creation, vulnerability scans, and network baselining. Build threat dashboards, analyze C2 communications, and create Snort rules. By integrating insights from logs and threat intelligence, participants will enhance their ability to detect, document, and escalate incidents effectively, strengthening organizational security.
Courses in this path
Security Analysis
Searching and discovering potential vulnerabilities within your applications, endpoints or network is the first step of defense to keeping your environment secure. In this path, you will learn the fundamentals of vulnerability analysis and how to identify those vulnerabilities with scanning tools.
Security Analysis Labs
These labs provide a comprehensive overview of threat confirmation, focusing on identifying Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), managing false positives, and prioritizing alerts using contextual analysis. Participants will learn to create incident reports, prepare data for visualization, and build dynamic dashboards to analyze trends, detect anomalies, and map threat activity. Through hands-on exercises, students will leverage tools like Splunk, Kibana, and Wireshark to investigate user activity, endpoint logs, and network traffic, enhancing their ability to detect and respond to security incidents effectively.