06-22-2024, 06:43 PM
Malware Analysis: Malicious Activity Detection
Duration: 1h 47m | .MP4 1280x720, 30 fps® | AAC, 48000 Hz, 2ch | 2.09 GB
Genre: eLearning | Language: English
Threat actors are constantly changing their tactics and evolving their tools. This course will teach you how to create custom detections to detect and prevent emerging threats in your organization.
Threat actors are constantly evolving their tactics, tools, and evasion techniques. In this course, Malware Analysis, Malicious Activity Detection, you'll learn the skills necessary to utilize this information to create custom detections with Yara, Suricata, and Sigma. First, you'll explore the use of Yara to detect malicious files. Yara enables you to stay on the cutting edge of detecting the newest file-based threats. Next, you'll get hands-on with Suricata creating custom rules to alert to malicious or suspicious network traffic. As most malware will need to communicate outside of your network, monitoring the network can provide valuable insight into catching malicious activity. Finally you'll dive into Sigma to create detections from endpoint log files. This will allow you to identify malicious activity based on behavioral data from your endpoints. When you're finished with this course you'll have the skills and knowledge necessary to create custom detections to defend your users and your organization.
Threat actors are constantly evolving their tactics, tools, and evasion techniques. In this course, Malware Analysis, Malicious Activity Detection, you'll learn the skills necessary to utilize this information to create custom detections with Yara, Suricata, and Sigma. First, you'll explore the use of Yara to detect malicious files. Yara enables you to stay on the cutting edge of detecting the newest file-based threats. Next, you'll get hands-on with Suricata creating custom rules to alert to malicious or suspicious network traffic. As most malware will need to communicate outside of your network, monitoring the network can provide valuable insight into catching malicious activity. Finally you'll dive into Sigma to create detections from endpoint log files. This will allow you to identify malicious activity based on behavioral data from your endpoints. When you're finished with this course you'll have the skills and knowledge necessary to create custom detections to defend your users and your organization.
[To see links please register or login]