Overview
Students will participate in attack analysis/incident response, including root cause determination, to identify vulnerabilities exploited, vector/source and methods used (e.g., malware, denial of service).
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468e8a9602fea5f5ca50c56_Participate_in_Attack_Analysis_Using_Trusted_Tool_Set.jpeg)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs