Malicious Activity Detection and Analysis
5 H 41 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Analyze Indicators of Potentially Malicious Activity
- Overview
- Malicious Network Activity
- Malicious Host Activity
- Malicious Application Activity
- Other Malicious Activity
- Tools and Techniques for Determining Malicious Activity
- Packet Capture Tools
- Log Analysis Tools
- Endpoint Detection and Response
- DNS and IP Reputation Tools
- File Analysis Tools
- Sandboxing Tools
- Email Analysis Tools
- User and Entity Behavior Analytics
- Scripting and Programming
- Threat Intelligence and Threat Hunting Concepts
- Threat Actor Types
- TTPs
- CTI Confidence Levels
- CTI Sources
- CTI Sharing
- Threat Hunting
- Efficiency and Process Improvement in Security Operations
- Process Standardization
- Streamlining Operations
- Integrating Tools and Technology Into Security Operations
Overview
2 M



- Episode Description
- Transcript
In this episode, we take a few moments to meet the hosts and go over what you can expect from this course.