Your cybersecurity team will participate in a half-day, instructor-led, online training mission without the commitment of an annual subscription.
Similar to Java NMS Kill, this scenario emulates a Watering-Hole attack in which the attacker sits and waits for the victim. The victim, having performed the expected action of navigating to a known, infected website enables the hacker to “eavesdrop” on all messages within the organization through the execution of a Trojan Horse. Participants will leverage their advanced analysis techniques in this complex attack to detect, analyze and stop the malicious code to minimize the attack surface and protect the organization from further compromise.
This course is for the Advanced level student and useful skills to be familiar with would be Linux log management, Linux forensics, HTML/Java knowledge, Checkpoint firewalls and MicroFocus ArcSight.
If you are a Tech Data Partner and would like to order a seat for this course for your team or to resell to a customer, please click the “Partner Pricing” button below which will forward you to the Tech Data eCommerce platform to order your course seats. You may send an email to cyberrangecloudUS@techdata.com for additional course details or ordering assistance.