Your cybersecurity team will participate in a half-day, instructor-led, online training mission without the commitment of an annual subscription.
In this scenario, a Trojan-infected CD-ROM has been inserted into a Windows Machine where the malware is auto-run and loaded from the device. Once inside, the malicious Trojan connects back to a Command and Control server where commands to steal secret files and important user information are executed. Participants will learn to detect and contain the malicious outbreak in order to control further spreading of the infected files, mitigate the data exfiltration and confirm that the outbreak has been contained.
This course is for the Intermediate level student and useful skills to be familiar with would be Windows forensics, Windows scripting, DC authentication, Checkpoint firewalls and MicroFocus ArcSight.
If you are a Tech Data Partner and would like to order a seat for this course for your team or to resell to a customer, please click the “Partner Pricing” button below which will send you to the Tech Data eCommerce platform to order your course seats. You may send an email to cyberrangecloudUS@techdata.com for additional course details or ordering assistance.
|CRC-KT-I||Per Person||4 Hrs||Online||$349.00|