Participate in Attack Analysis Using Trusted Tool Set

Students will participate in attack analysis/incident response, including root cause determination, to identify vulnerabilities exploited, vector/source and methods used (e.g., malware, denial of service).

Overview

Students will participate in attack analysis/incident response, including root cause determination, to identify vulnerabilities exploited, vector/source and methods used (e.g., malware, denial of service).

Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs