Wait a minute..
In this course, participants will learn how to use open-source tools to
analyze an intrusion in the network. The training will prepare the participants to put new skills and
knowledge to work immediately upon returning to a live environment. Participants
will learn to investigate and reconstruct activity to deem if it is noteworthy
or a false indication. Based on
these activities, participants can detect the intrusion pattern.