Searching for Indicators of Compromise

Any Internet-facing application can be exploited. How do you know what to look for? This scenario-based lab shows you how to identify attacks by recognizing indicators of compromise (IOCs) present in the intrusion detection system (IDS) as well as evidence on a compromised system.

Overview

Any Internet-facing application can be exploited. How do you know what to look for? This scenario-based lab shows you how to identify attacks by recognizing indicators of compromise (IOCs) present in the intrusion detection system (IDS) as well as evidence on a compromised system.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs