Participate in Attack Analysis Using Trusted Tool Set
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Time
38 minutes
Difficulty
Intermediate

Students will participate in attack analysis/incident response, including root cause determination, to identify vulnerabilities exploited, vector/source and methods used (e.g., malware, denial of service). Students will then investigate and correlate system logs to identify missing ...

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Overview

Participate in Attack Analysis Using Trusted Tool

The CybrScore Participate in Attack Analysis Using Trusted Tool Set is a premium lab aimed to prepare you to identify vulnerabilities that were exploited, attack vectors, and methods of attack to allow you to do analysis and incident response. It is intended for Intermediate level students. The CybrScore Participate in Attack Analysis Using Trusted Tool Set lab teaches students how to gather system information, identify the anomalous process, and find the extent of intrusion through analysis.

Upon successful completion of the CybrScore Participate in Attack Analysis Using Trusted Tool Set lab, the student will be able to participate in the attack analysis and incident response to identify vulnerabilities. Capture a list of the current environmental variables that later will be analyzed for any anomalies in the variables. The CybrScore Participate in Attack Analysis Using Trusted Tool Set lab takes approximately 1 to 2 hours to complete for most students.

In the CybrScore Participate in Attack Analysis Using Trusted Tool Set lab, students will learn about environmental variables. These will be useful for any anomalies found in the system later on in the investigation. This skill is a very important part of the process allowing you to drill down into the attacker's movement.

In the CybrScore Participate in Attack Analysis Using Trusted Tool Set lab, students will learn about tools that will be used to asses network connections. Netstat will be used to output existing Incident Response text files and show all the process ID’s. The student utilizes ipconfig to gain and capture network interfaces on the victim’s network.

In the CybrScore Participate in Attack Analysis Using Trusted Tool Set lab, students will learn about SysInternal Suite, which is part of the trusted toolset. They will use a tool call psloglist to pull and save security logs for later analysis.

The CybrScore Participate in Attack Analysis Using Trusted Tool Set lab is presented by Cybrary and was created by CybrScore. CybrScore is a fully immersive, experience-based, hands-on training catalog designed to help people to learn security, by doing. This continuously evolving suite of hands-on labs will teach security professionals how to become efficient and effective at attack analysis. As you and your team face more threats and defend your network, your entire organization becomes safer. Spending less time fixing security attacks more time preventing them. The CybrScore Participate in Attack Analysis Using Trusted Tool Set lab provides that persistent training, with the analytics and reporting (via Cybrary) to ensure that you and your team are continually improving. This lab is quick to perform, up to date and fun to interact with

Completion of the CybrScore Participate in Attack Analysis Using Trusted Tool Set lab means that the student has demonstrated the ability to identify vulnerabilities that were exploited, attack vectors, and methods of attack to allow them to do analysis and incident response.