CBROPS: Log Evidence, Disk Images, & Malware Analysis Output

Cisco CBROPS
  • 3 Videos | 51m 32s
  • Includes Assessment
  • Earns a Badge
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

WHAT YOU WILL LEARN

  • apply examples of evidence to their type of evidence
    recognize how data must be acquired from logs to be considered evidence
    recognize the use of the different types of evidence
    compare a duplicated target disk to the original source disk
    work with commands to create a disk image for an investigation
  • work with disk to create a bit-by-bit duplicate
    recognize important attack information provided by malware analysis tools
    recognize information provided by malware analysis tools
    recognize malware analysis tools and the information they can provide

IN THIS COURSE

  • Locked
    1. 
    Types of Log-based Evidence
    19m 13s
  • Locked
    2. 
    Comparing Disk Images
    15m 57s
  • Locked
    3. 
    Interpreting Output from Malware Analysis Tools
    16m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.