• Classroom
  • Online, Instructor-Led

Learning Objectives

  • Identify and analyze attacks across the various layers of the network stack
  • Identify signs of reconnaissance being conducted against a network and recommend mitigation steps to limit the data provided to attackers
  • Perform flow analysis to uncover anomalous and malicious activity at a statistical level
  • Detect and investigate tunneling, botnet command-and-control traffic, and other forms of covert communications being utilized in a network
  • Accurately correlate multiple stages of malicious activity in order to build a complete picture of the scope and impact of a coordinated network intrusion

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):