YoVDO

Incident Response with Fireeye - Final Hackersploit Blue Team Training

Offered By: Linode via YouTube

Tags

Incident Response Courses Blue Team Courses File Analysis Courses

Course Description

Overview

Explore incident response techniques using FireEye's Redline in this comprehensive tutorial video. Learn how to leverage Redline's investigative capabilities for memory and file analysis to detect signs of malicious activity and develop threat assessment profiles. Discover the process of installing and opening FireEye Redline, collecting data using both comprehensive and default collectors, and opening analysis sessions. Gain practical experience through a hands-on demonstration and understand the prerequisites and resources needed for effective incident response. Perfect for blue team members and cybersecurity professionals looking to enhance their skills in digital forensics and threat detection.

Syllabus

Introduction
What We Will Be Covering
Pre Requisites
Introduction to FireEye Redline
Resources
Practical Demo
Installing / Opening FireEye Redline
Collecting Data with FireEye Redline
Using Comprehensive Collection
Using the Default Collector
Opening an Analysis Session
Conclusion


Taught by

Linode

Related Courses

Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight
Privilege Escalation with UACMe
Pluralsight
Splunk Security Event Monitoring - Blue Team Series with Hackersploit
Linode via YouTube
Intrusion Detection with Suricata - Blue Team Series with Hackersploit
Linode via YouTube
Intrusion Detection with Wazuh - Blue Team Series with Hackersploit
Linode via YouTube