Network Analysis with Real Intelligence Threat Analytics (RITA)
Offered By: Pluralsight
Course Description
Overview
In this course, you'll learn network traffic analysis using RITA, how to develop better and better Indicators of Compromise (IOC) or better threat intelligence for detecting command and control communication through network traffic analysis.
Detecting command and control communication through network traffic analysis is the need of the hour. In this course, Network Analysis with Real Intelligence Threat Analytics (RITA), you’ll learn about RITA and its main functions. You’ll explore how to detect threats with adversarial malware and malware components that can be used during targeting which build malicious software which can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media techniques (T1071.001,T1205.002 & T1572 ). When you’re finished with this course, you’ll have the skills and knowledge to detect blacklist checking, DNS tunneling detection, and beaconing detection in an enterprise environment.
Detecting command and control communication through network traffic analysis is the need of the hour. In this course, Network Analysis with Real Intelligence Threat Analytics (RITA), you’ll learn about RITA and its main functions. You’ll explore how to detect threats with adversarial malware and malware components that can be used during targeting which build malicious software which can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media techniques (T1071.001,T1205.002 & T1572 ). When you’re finished with this course, you’ll have the skills and knowledge to detect blacklist checking, DNS tunneling detection, and beaconing detection in an enterprise environment.
Syllabus
- Course Overview 1min
- Evaluating the Core Malware Detection Capabilities of RITA 21mins
- Resources 1min
Taught by
Pluralsight
Related Courses
Security Event Triage: Detecting Network Anomalies with Behavioral AnalysisPluralsight Big Dark Data - Federico Charosky, Quorum Cyber - Update
The Cyber Academy via YouTube Big Dark Data - Federico Charosky, Quorum Cyber
The Cyber Academy via YouTube Responding to the Ever Evolving Threat Landscape - DefCamp - 2021
DefCamp via YouTube DNS Tunnelling - It's All in the Name!
Security BSides London via YouTube