Incident Response with Fireeye - Final Hackersploit Blue Team Training
Offered By: Linode via YouTube
Course Description
Overview
Explore incident response techniques using FireEye's Redline in this comprehensive tutorial video. Learn how to leverage Redline's investigative capabilities for memory and file analysis to detect signs of malicious activity and develop threat assessment profiles. Discover the process of installing and opening FireEye Redline, collecting data using both comprehensive and default collectors, and opening analysis sessions. Gain practical experience through a hands-on demonstration and understand the prerequisites and resources needed for effective incident response. Perfect for blue team members and cybersecurity professionals looking to enhance their skills in digital forensics and threat detection.
Syllabus
Introduction
What We Will Be Covering
Pre Requisites
Introduction to FireEye Redline
Resources
Practical Demo
Installing / Opening FireEye Redline
Collecting Data with FireEye Redline
Using Comprehensive Collection
Using the Default Collector
Opening an Analysis Session
Conclusion
Taught by
Linode
Related Courses
Blue Team Tools: Defense against Adversary Activity Using MITRE TechniquesPluralsight Privilege Escalation with UACMe
Pluralsight Splunk Security Event Monitoring - Blue Team Series with Hackersploit
Linode via YouTube Intrusion Detection with Suricata - Blue Team Series with Hackersploit
Linode via YouTube Intrusion Detection with Wazuh - Blue Team Series with Hackersploit
Linode via YouTube