مروری بر دوره
Whether you handle an intrusion incident, data theft case, employee misuse scenario, or are engaged in proactive adversary discovery, the network often provides an unparalleled view of the incident. SANS FOR572 covers the tools, technology, and processes required to integrate network evidence sources into your investigations to provide better findings, and to get the job done faster.
.
سرفصل ها
- FOR572.1: Off the Disk and Onto the Wire
- FOR572.2: Core Protocols & Log Aggregation/Analysis
- FOR572.3: NetFlow and File Access Protocols
- FOR572.4: Commercial Tools, Wireless, and Full-Packet Hunting
- FOR572.5: Encryption, Protocol Reversing, OPSEC, and Intel
- FOR572.6: Network Forensics Capstone Challenge
مخاطبان دوره
- Incident response team members and forensicators
- Hunt team members
- Law enforcement officers, federal agents, and detectives
- Security Operations Center (SOC) personnel and information security practitioners
- Network defenders
- Information security managers
- Network engineers
- Information technology professionals
- Anyone interested in computer network intrusions and investigations
به عنوان اولین نفر، نظر خود را بنویسید!