Netflow analysis, NIDS components (log analysis, blackhole routing, honeypots, DNS), developing SNORT signatures and YARA patterns, other Network and endpoint countermeasures, cloud security broker.
Netflow analysis, NIDS components (log analysis, blackhole routing, honeypots, DNS), developing SNORT signatures and YARA patterns, other Network and endpoint countermeasures, cloud security broker.
Attendees will have the opportunity to analyze a compromised windows system with nfdump and netflow analysis.
This course is dedicated to people who are familiar with: