Project Ares Enterprise + Cyber Defense Analyst Protocol Analysis Bundle
Project Ares Enterprise + Cyber Defense Analyst Protocol Analysis Bundle
Available:
In Stock
$898.00

Project Ares Enterprise
Virtual Courses & Labs
- Lab Environment Orientation
- Additional Scanning Options
- Analysis and Recommendation Report
- Analyze Various Data Sources to Confirm Suspected Infection
- Applying Filters to TCPDump and Wireshark
- Comprehensive Threat Response
- Detect the Introduction of a Malicious Application
- Gap Analysis of Firewall Rules
- Identify Whether High-Risk Systems Were Affected
- Log Correlation and Analysis
- Manual Vulnerability Assessment
- Manually Creating a Baseline with MD5Deep
- Monitoring and Verifying Management Systems
- Monitoring for False Positives
- Monitoring Network Traffic
- Network Discovery
- Network Segmentation (FW/DMZ/WAN/LAN)
- Network Topology Generation
- Parse Files Out of Network Traffic
- Preliminary Scanning
- Report writing for presentation to management
- Using Snort and Wireshark to Analyze Traffic
- Vulnerability Analysis Protection
Project Ares Enterprise
Virtual Courses & Labs
- Lab Environment Orientation
- Additional Scanning Options
- Analysis and Recommendation Report
- Analyze Various Data Sources to Confirm Suspected Infection
- Applying Filters to TCPDump and Wireshark
- Comprehensive Threat Response
- Detect the Introduction of a Malicious Application
- Gap Analysis of Firewall Rules
- Identify Whether High-Risk Systems Were Affected
- Log Correlation and Analysis
- Manual Vulnerability Assessment
- Manually Creating a Baseline with MD5Deep
- Monitoring and Verifying Management Systems
- Monitoring for False Positives
- Monitoring Network Traffic
- Network Discovery
- Network Segmentation (FW/DMZ/WAN/LAN)
- Network Topology Generation
- Parse Files Out of Network Traffic
- Preliminary Scanning
- Report writing for presentation to management
- Using Snort and Wireshark to Analyze Traffic
- Vulnerability Analysis Protection
