Logs, Loaders, and Beacons
In this hands-on challenge, you will practice using web logs and a SIEM to analyze possible program execution, persistence, credential stealing, lateral movement, command and control (C2), and data exfiltration attempts during a known security incident.

Course Content
In this hands-on challenge, you will practice using web logs and a SIEM to analyze possible program execution, persistence, credential stealing, lateral movement, command and control (C2), and data exfiltration attempts during a known security incident.














