Identifying Malicious Network Connections

When investigating a cybersecurity incident it's important to take memory snapshots of affected systems for further analysis. Students will conduct analysis and look for malicious network connections, processes, and other artifacts.

Overview

When investigating a cybersecurity incident it's important to take memory snapshots of affected systems for further analysis. Students will conduct analysis and look for malicious network connections, processes, and other artifacts.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs