Whitelisting & Suspicious File Verification Capstone

In this lab, you will create a set of hashes representing all the files on a company's newly built system. Next, you will become familiar with procedures used to create trusted whitelists, compile a list of new/unknown files, changes to files already in the baseline and validate the maliciousness or harmlessness of reported files.

Time
2 hours
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you will create a set of hashes representing all the files on a company's newly built system. Next, you will become familiar with procedures used to create trusted whitelists, compile a list of new/unknown files, changes to files already in the baseline and validate the maliciousness or harmlessness of reported files.