CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
3 Videos | 51m 32s
- Includes Assessment
- Earns a Badge
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
WHAT YOU WILL LEARN
apply examples of evidence to their type of evidencerecognize how data must be acquired from logs to be considered evidencerecognize the use of the different types of evidencecompare a duplicated target disk to the original source diskwork with commands to create a disk image for an investigation
work with disk to create a bit-by-bit duplicaterecognize important attack information provided by malware analysis toolsrecognize information provided by malware analysis toolsrecognize malware analysis tools and the information they can provide
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE