Wait a minute..
In this course, participants will learn how to use open-source tools to
analyze an intrusion in the network. The training will prepare the participants to put new skills and
knowledge to work immediately upon returning to a live environment. Participants
will learn to investigate and reconstruct activity to deem if it is noteworthy
or a false indication. Based on
these activities, participants can detect the intrusion pattern.
Program Requirements
What will I learn?
Curriculum for this course
In this course, participants will learn how to use open-source tools to
analyze an intrusion in the network. The training will prepare the participants to put new skills and
knowledge to work immediately upon returning to a live environment. Participants
will learn to investigate and reconstruct activity to deem if it is noteworthy
or a false indication. Based on
these activities, participants can detect the intrusion pattern.