on 2017-10-24 12:04 PM
In order to register for a class, you need to first create a Dell Education account
If you need further assistance, contact us
Summary
This on-demand learning presents adaptive techniques for security teams proactively seeking to detect, understand, and disrupt coordinated intrusions with RSA NetWitness Endpoint.
Overview
This self-paced on-demand learning presents techniques prescribed by security analysts for employing RSA NetWitness Endpoint to locate sophisticated targeted attacks. Finding known malware and obviously malicious behavior is easy with this tool’s Instant Indicators of Compromise, but sophisticated intrusions can be far more challenging. Indicators of specific exploits and threats, such as common keylogging techniques, are detailed.
Audience
Security analysts using RSA NetWitness Endpoint to locate suspicious files, processes, and activity on an organization’s endpoint computers.
Delivery Type
On-Demand Learning (self-paced eLearning)
Duration
2 hours
Prerequisite Knowledge/Skills
Students should have completed the RSA NetWitness Endpoint Fundamentals prior to viewing this course. Experienced analysis with at least six month of real-world security analysis with NetWitness Endpoint is recommended.
Learning Objectives
Upon successful completion of this course, participants should be able to:
Establish timeline based on most trusted timestamps
Course Outline
In order to register for a class, you need to first create a Dell Education account
If you need further assistance, contact us