Whitelisting & Suspicious File Verification Capstone
In this lab, you will create a set of hashes representing all the files on a company's newly built system. Next, you will become familiar with procedures used to create trusted whitelists, compile a list of new/unknown files, changes to files already in the baseline and validate the maliciousness or harmlessness of reported files.
Time
2 hours
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you will create a set of hashes representing all the files on a company's newly built system. Next, you will become familiar with procedures used to create trusted whitelists, compile a list of new/unknown files, changes to files already in the baseline and validate the maliciousness or harmlessness of reported files.
Learning Partner