back

Malicious Activity Detection and Analysis

5 H 23 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Analyze Indicators of Potentially Malicious Activity
    • Overview
    • Malicious Network Activity
    • Malicious Host Activity
    • Malicious Application Activity
    • Other Malicious Activity
  • Tools and Techniques for Determining Malicious Activity
    • Packet Capture Tools
    • Log Analysis Tools
    • Endpoint Detection and Response
    • DNS and IP Reputation Tools
    • File Analysis Tools
    • Sandboxing Tools
    • Email Analysis Tools
    • User and Entity Behavior Analytics
  • Threat Intelligence and Threat Hunting Concepts
    • Threat Actor Types
    • TTPs
    • CTI Confidence Levels
    • CTI Sources
    • CTI Sharing
    • Threat Hunting
  • Efficiency and Process Improvement in Security Operations
    • Process Standardization
    • Streamlining Operations
    • Integrating Tools and Technology Into Security Operations

Overview

2 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

In this episode, we take a few moments to meet the hosts and go over what you can expect from this course.

WEBVTT >> Welcome. And thanks for joining us over the discourse, malicious activity, detection and analysis and will stumble over the a lot of big words and your host for the score. Sophie Goodwin been hosting other security focus courses alongside Daniel and I did recently a team I for cyber security certifications. I'm excited about that. And that means that you're just in the best hands possible. Really? I know what I'm talking about. But and about me, you want to hear more about Daniel Laurie, our subject matter expert for the score story, didn't I'm doing great. I feel like I should just let you see the whole dang thing because I feel that idea with. >> And well, I'd I had to do it. I guess if you maybe see forced my hand. And so you will see this face throughout this course as well as the U.S. in. But I would be the one teaching you the concepts and tools and all the fun things that we're going to do throughout this. I do have some security experience probably last 6, 7, years, I guess now as well as Industry-recognized certifications on with that. So that's where we're coming from. I'll take that knowns the years of hard learning and do my best to deliver that information to you so that you can take those skills, apply them to yourself, synthesize that into your person and then work in this space, which would probably be something like a stock analyst in our analysis, that kind of stuff. >> So those those that are going to be watching this course, what exactly would be getting out of it. >> So what we'll be getting out. This is a plethora of knowledge that will really you for the potential hire into a role as something like a stock analyst as an entry level. Right? So things were going to cover in this course are going to include like indicators of potentially malicious activity, right? They also have Domina covers tools and techniques for determining potentially the most is activity. Well, most activities going on in this course they didn't do that. We also have threat intelligence and threat hunting. That is a lot of fun, too, covering some of the concepts around that some tools you can use to make that happen as well as efficiency in process improvement and security operations as the main domains that will be covering is kind of how I've split this up. It's kind of take this a chunk of time. Hopefully at the end of this course, you have some really relevant working skills for yourselves that you can play that your resume, hopefully find those jobs or move up in your your job. Well. >> This is like the course is structured kind of like use of 4 domains and that system telling him pulled up. So that's exactly right. Chaos. And so it's it's jumped out for us making the manager Laurent, but it is going to buy fast because we are a lot of fun recording this and I'm looking forward to to getting into it. So thank you for giving us a heads up as to what we can expect in this course. Malicious activity, detection and analysis. And thank you for joining us for the review to see you in the course