Monitoring Network Traffic for Potential IOA/IOC
CYBRScore
Virtual Lab

Time
1 hour
Difficulty
Intermediate

In this lab we will replicate potentially malicious scans from the Internet against a corporate asset. Scans from the Internet are very common. An analyst should know how to identify this activity by artifacts that are present in the IDS as well as entries in the web logs.

Become one of the 3 million IT and Cyber professionals advancing their careers

Sign up with
Or

Already have an account? Sign In »

This Virtual Lab is part of a Career Path: Become a SOC Analyst - Level 2

Overview

In this lab we will replicate potentially malicious scans from the Internet against a corporate asset. Scans from the Internet are very common. An analyst should know how to identify this activity by artifacts that are present in the IDS as well as entries in the web logs.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this virtual lab in a guided Career Path.

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this virtual lab in a guided Career Path.