Overview
Any Internet-facing application can be exploited. How do you know what to look for? This scenario-based lab shows you how to identify attacks by recognizing indicators of compromise (IOCs) present in the intrusion detection system (IDS) as well as evidence on a compromised system.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468ec1d84f235a136da9b15_Searching_for_Indicators_of_Compromise.png)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs