Incident Analysis: Credential Access
In this hands-on lab, you will learn how to analyze common initial access mechanisms during an incident response engagement.

Course Content
Upon completing this lab, you should be able to:
- Describe the technique "Exploit Public-Facing Application".
- Develop and test hypotheses relevant to exploitation-related events.
- Describe how generic analytical methods can be applied to the examination of exploitation-related activity.
- Examine and analyze example evidence of the Initial Access technique T1190 Exploit Public-Facing Application.
- Determine whether command injection exploitation attempts were successful via corroboration in process creation telemetry.
- Document different Initial Access findings.













