Course Summary
This course will teach you how to address complex and unique challenges faced by Intrusion Analysts. You will learn how to solve multi-step problems by applying a variety of concepts and methodologies to detect malicious activity.
– Protocol Analysis
– Network Analysis
– Intrusion Analysis
Advanced Analysis Techniques
The candidate will learn how to use core tools and techniques, such as decrypting TLS traffic with Wireshark and building and sending packets with Scapy.
Application Traffic Analysis
The candidate will learn to inspect common Application Layer protocols to effectively analyze and draw accurate conclusions.
IDS Application and Analysis
The candidate will learn to use common IDS tools to analyze network artifacts.
Malicious Traffic Analysis
The candidate will learn to analyze malicious or suspicious network traffic using a variety of tools and methods.
Network Forensics
The candidate will learn to analyze artifacts and reconstruct events to understand what occurred during a specific incident or time frame.
Network Traffic Analysis
The candidate will learn to analyze typical and anomalous network traffic, using different tools and techniques to identify stimulus and response patterns.
Protocol Analysis
The candidate will learn to assess network capture files, focusing on detailed analysis of protocols, connections, ports, and sessions.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT