This training covers the fundamentals of live analysis & investigation for endpoints with Trellix Endpoint Security (HX).
Duration: 3 days
A working understanding of networking & network security, the Windows operating system, file system, registry & regular expressions. Scripting experience with Python or PowerShell is beneficial.
Network security professionals & incident responders who must use Trellix Endpoint Security (HX) to investigate, identify & stop cyber threats, as well as security analysts who want to learn investigation techniques used to respond to today's cyber threats.
After completing this training, learners should be able to:
1. Threats & Malware Trends
2. Initial Alerts
3. Using Audit Viewer & Redline®
4. Windows Telemetry
– Memory artifacts
– System information
– Processes
– File system
– Configuration files
– Services
– Scheduled tasks
– Logging
1. Acquisitions
2. Endpoint Security (HX) extended capabilities
1. Investigation Methodology
– Evidence of initial compromise
– Evidence of persistence
– Evidence of lateral movement
– Evidence of internal reconnaissance
– Evidence of data exfiltration
2. Capstone Capture the Flag (CTF)
Endpoint security is a process of protecting devices like desktops, laptops, mobile phones, & tablets from malicious threats & cyberattacks. Endpoint security software allows businesses to protect devices that employees use for work, either on a network or in cloud, from cyber threats.
The MITRE ATT&CK® framework is a knowledge base of tactics & techniques designed for threat hunters, defenders & red teams to help classify attacks, identify attack attribution & objectives, & assess an organization's risk.
A working understanding of networking & network security, the Windows operating system, file system, registry & regular expressions. Scripting experience with Python or PowerShell is beneficial.
Yes, professionals can pay from the training page.
The training completion certification will be awarded to all the professionals who've completed the training program & the project assignment given by your instructor. You may use the certificate in your future job interviews will surely help you to l& your dream job.
Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & developmental platforms. Moreover, training is undertaken by some experts with a range of experience in their domain.
Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.
Yes, Radiant will provide you most updated high, value-relevant real-time projects & case studies in each training program.