Learn how to effectively respond to incidents in your AWS accounts regardless of whether you are running a single or multi-account setup using CloudTrail Lake and Athena — two native AWS services. This Incident Response (IR) course simulates attacks against your AWS environments that have been...
Explore essential tools and techniques for handling network security. Unlock the potential of Wireshark to garner insights into traffic patterns and threats. Investigate common network threats in-depth, such as data exfiltration and multistage malware, following practical case studies. Discover...
Explore essential tools and techniques for handling network security. Unlock the potential of Wireshark to garner insights into traffic patterns and threats. Investigate common network threats in-depth, such as data exfiltration and multistage malware, following practical case studies. Discover...
CYBERSECURITY CONCEPTS:
Course Overview
Common Log Ingestion Concepts
Common Operating System Concepts
Common Infrastructure Concepts
Common IAM Concepts
Common Encryption Concepts
Protecting Sensitive Data
Common Network Architecture
Malicious Network Activity
Malicious Host Activity...
protectaccount
Thread
003
activity
analysis
and
common
communicate
comptia
concepts
cs0
cysa
file
html
incident
malicious
net
rapidgator
rar
response
tools
vulnerability