Incident Response with Fireeye - Final Hackersploit Blue Team Training
Offered By: Linode via YouTube
Course Description
Overview
Explore incident response techniques using FireEye's Redline in this comprehensive tutorial video. Learn how to leverage Redline's investigative capabilities for memory and file analysis to detect signs of malicious activity and develop threat assessment profiles. Discover the process of installing and opening FireEye Redline, collecting data using both comprehensive and default collectors, and opening analysis sessions. Gain practical experience through a hands-on demonstration and understand the prerequisites and resources needed for effective incident response. Perfect for blue team members and cybersecurity professionals looking to enhance their skills in digital forensics and threat detection.
Syllabus
Introduction
What We Will Be Covering
Pre Requisites
Introduction to FireEye Redline
Resources
Practical Demo
Installing / Opening FireEye Redline
Collecting Data with FireEye Redline
Using Comprehensive Collection
Using the Default Collector
Opening an Analysis Session
Conclusion
Taught by
Linode
Related Courses
Gemini in Google DriveGoogle via Google Cloud Skills Boost System and File Analysis with Bash
Pluralsight File Analysis with TruffleHog
Pluralsight Google Attacks
Black Hat via YouTube Beyond AV - Detection-Oriented File Analysis
Security BSides San Francisco via YouTube