Course Summary
This course will teach you how to address complex and unique challenges faced by Intrusion Analysts. You will learn how to solve multi-step problems by applying a variety of concepts and methodologies to detect malicious activity.
– Protocol Analysis
– Network Analysis
– Intrusion Analysis
Advanced Analysis Techniques
The candidate will demonstrate proficiency with core tools and programs e.g. decrypting TLS traffic with Wireshark, building and sending a packet with Scapy.
Application Traffic Analysis
The candidate will inspect common Application Layer protocols to demonstrate skill in analysis and correct conclusions.
IDS Application and Analysis
The candidate will use common IDS-related tools to analyze artifacts.
Malicious Traffic Analysis
The candidate will analyze malicious or suspicious network traffic using a variety of tools and approaches.
Network Forensics
The candidate will analyze artifacts and show skill in determining what took place within a certain incident or time-frame.
Network Traffic Analysis
The candidate will analyze typical and abnormal stimulus and response network traffic using a variety of tools and approaches.
Protocol Analysis
The candidate will evaluate network capture files to show proficiency in detail analysis with a focus on topics such as protocols, connections, ports, and sessions.
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM