Project Ares Professional + Cyber Defense Incident Handling Methodology Bundle
Rated 3.5/5 based on 11 customer reviews

Project Ares Professional + Cyber Defense Incident Handling Methodology Bundle

Available: In Stock
$648.00

Image

Project Ares Professional Bundle

Activities/Labs:

  • Lab Environment Orientation - *** (Start Here!) ***
  • Advanced Techniques for Malware Recovery
  • Analyze and Classify Malware
  • Block Incoming Traffic on Known Port
  • Collecting Logs and Verifying Syslog Aggregation
  • Creating Recommendations Based on Vulnerability Assessments
  • Disable User Account on Windows 7
  • Firewall Setup and Configuration
  • Identify Whether High-Risk Systems Were Affected
  • Identifying Malicious Network Connections
  • Implement Single System Changes in Firewall
  • Linux Users and Groups
  • Log Analysis
  • Manually Creating a Baseline with MD5Deep
  • Microsoft Baseline Security Analyzer
  • Monitoring Network Traffic
  • Patches and Updates
  • Protect Against Beaconing
  • Report writing for presentation to management
  • Setting Up SYSLOG Forwarding From a Windows System
  • System Hardening
  • Using Snort and Wireshark to Analyze Traffic
  • Whitelist Comparison

Project Ares Professional Bundle

Activities/Labs:

  • Lab Environment Orientation - *** (Start Here!) ***
  • Advanced Techniques for Malware Recovery
  • Analyze and Classify Malware
  • Block Incoming Traffic on Known Port
  • Collecting Logs and Verifying Syslog Aggregation
  • Creating Recommendations Based on Vulnerability Assessments
  • Disable User Account on Windows 7
  • Firewall Setup and Configuration
  • Identify Whether High-Risk Systems Were Affected
  • Identifying Malicious Network Connections
  • Implement Single System Changes in Firewall
  • Linux Users and Groups
  • Log Analysis
  • Manually Creating a Baseline with MD5Deep
  • Microsoft Baseline Security Analyzer
  • Monitoring Network Traffic
  • Patches and Updates
  • Protect Against Beaconing
  • Report writing for presentation to management
  • Setting Up SYSLOG Forwarding From a Windows System
  • System Hardening
  • Using Snort and Wireshark to Analyze Traffic
  • Whitelist Comparison