This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Education Courses
  • NetWitness Community
  • NetWitness Education
  • Courses
  • RSA NetWitness Logs and Packets Use Case Analysis
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

RSA NetWitness Logs and Packets Use Case Analysis

ElizabethMalone
Employee ElizabethMalone
Employee
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

on ‎2016-10-04 12:00 AM

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

Summary

This on-demand lab presents techniques to analyze an RSA NetWitness Logs and Packets environment use case. Students will be presented with a scenario, and then will have an opportunity to identify and reconstruct use cases in a virtual lab environment.

 

Overview
This interactive on-demand lab will help you to improve your knowledge of RSA NetWitness Logs and Packets. Within a case-study scenario, you will act as a Security Analyst at a fictitious company tasked with investigating security issues. Critical techniques are explained by a series of optional video demonstrations. After your initial investigation, you will be tasked with identifying and solving the issues in a hands-on lab environment using the printable lab guide. Specifically, you will attempt to identify and reconstruct a malicious network intrusion leveraging both log and packet data. After the guided lab, you will come back to the on-demand learning window for a summary of actions performed. Next, you will take an assessment required for credit in this course. And finally, you will complete a student evaluation.


Audience
RSA Professional Services Consultants and Partner Consultants


Delivery Type
On-Demand Lab


Duration
4 hours


Scheduling Lab Time
Schedule lab time at https://traininglabs.rsa.com (Detailed account creation & scheduling instructions are in your Lab Guide).


Prerequisite Knowledge/Skills
Students should have completed the following training (or have equivalent knowledge) prior to taking this training:

  • RSA NetWitness Logs and Packets Foundations
  • RSA NetWitness Logs and Packets Introduction

 

Learning Objectives
Upon successful completion of this training, participants should be able to:

  • Investigate a common analysis use case: the presence of malware as revealed by log entries in the environment
  • Identify the malware, and to trace its movement through the network
  • Integrate packet data into your investigation to reconstruct the specific actions of the malware
  • Determine the cause and nature of the threat, and suggest remediation

 

Course Outline

  • Course Introduction
  • Scenario Introduction
  • Instructional Videos
  • Hands-on Lab
  • Summary
  • Assessment
  • Course Evaluation

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

  • 10.6
  • analyst
  • Best Practices
  • Ed Services
  • education
  • Education Services
  • english
  • fee
  • Getting Started
  • Investigation
  • logs and packets
  • navigator
  • NetWitness
  • netwitness logs and packets
  • netwitness navigator
  • netwitness training
  • NW
  • NWP
  • on demand lab
  • Product Training
  • RSA NetWitness
  • RSA NetWitness Platform
  • RSA NetWitness Training
  • RSA University
  • RSAU
  • security events
  • training
  • Training Course
  • use case analysis
Was this article helpful? Yes No
0 Likes
Share
Version history
Last update:
‎2016-10-04 12:00 AM
Updated by:
Employee ElizabethMalone
Contributors
  • ElizabethMalone
    ElizabethMalone
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.