CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
Cisco CBROPS
| Intermediate
- 3 videos | 51m 32s
- Includes Assessment
- Earns a Badge
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
WHAT YOU WILL LEARN
-
Apply examples of evidence to their type of evidencerecognize the use of the different types of evidencerecognize how data must be acquired from logs to be considered evidenceCompare a duplicated target disk to the original source diskwork with disk to create a bit-by-bit duplicate
-
work with commands to create a disk image for an investigationRecognize important attack information provided by malware analysis toolsrecognize information provided by malware analysis toolsrecognize malware analysis tools and the information they can provide
IN THIS COURSE
-
19m 13s
-
15m 57s
-
16m 22s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.