Project Ares Academy Plus + Cyber Defense Incident Handling Methodology Bundle
Rated 3.5/5 based on 11 customer reviews

Project Ares Academy Plus + Cyber Defense Incident Handling Methodology Bundle

Available: In Stock
$348.00

Image

Project Ares Academy Plus Bundle

  • Activities/Labs:

    • Lab Environment Orientation - *** (Start Here!) ***
    • Advanced Techniques for Malware Recovery
    • Analyze and Classify Malware
    • Block Incoming Traffic on Known Port
    • Collecting Logs and Verifying Syslog Aggregation
    • Creating Recommendations Based on Vulnerability Assessments
    • Disable User Account on Windows 7
    • Firewall Setup and Configuration
    • Identify Whether High-Risk Systems Were Affected
    • Identifying Malicious Network Connections
    • Implement Single System Changes in Firewall
    • Linux Users and Groups
    • Log Analysis
    • Manually Creating a Baseline with MD5Deep
    • Microsoft Baseline Security Analyzer
    • Monitoring Network Traffic
    • Patches and Updates
    • Protect Against Beaconing
    • Report writing for presentation to management
    • Setting Up SYSLOG Forwarding From a Windows System
    • System Hardening
    • Using Snort and Wireshark to Analyze Traffic
    • Whitelist Comparison

Project Ares Academy Plus Bundle

  • Activities/Labs:

    • Lab Environment Orientation - *** (Start Here!) ***
    • Advanced Techniques for Malware Recovery
    • Analyze and Classify Malware
    • Block Incoming Traffic on Known Port
    • Collecting Logs and Verifying Syslog Aggregation
    • Creating Recommendations Based on Vulnerability Assessments
    • Disable User Account on Windows 7
    • Firewall Setup and Configuration
    • Identify Whether High-Risk Systems Were Affected
    • Identifying Malicious Network Connections
    • Implement Single System Changes in Firewall
    • Linux Users and Groups
    • Log Analysis
    • Manually Creating a Baseline with MD5Deep
    • Microsoft Baseline Security Analyzer
    • Monitoring Network Traffic
    • Patches and Updates
    • Protect Against Beaconing
    • Report writing for presentation to management
    • Setting Up SYSLOG Forwarding From a Windows System
    • System Hardening
    • Using Snort and Wireshark to Analyze Traffic
    • Whitelist Comparison