Searching for Indicators of Compromise
Any Internet-facing application can be exploited. How do you know what to look for? This scenario-based lab shows you how to identify attacks by recognizing indicators of compromise (IOCs) present in the intrusion detection system (IDS) as well as evidence on a compromised system.
Time
1 hour
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
Any Internet-facing application can be exploited. How do you know what to look for? This scenario-based lab shows you how to identify attacks by recognizing indicators of compromise (IOCs) present in the intrusion detection system (IDS) as well as evidence on a compromised system.
Learning Partner