Course Features
Duration
36 minutes
Delivery Method
Online
Available on
Downloadable Courses
Accessibility
Mobile, Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Teaching Type
Self Paced
Video Content
36 minutes
Course Description
Course Overview
International Faculty
Post Course Interactions
Instructor-Moderated Discussions
Case Studies, Captstone Projects
Skills You Will Gain
What You Will Learn
You'll cover how to utilize Wazuh to respond to data exfiltration in an enterprise environment
First, you'll create a rule to detect malicious filesystem operations
Next, you'll uncover a rootkit through Wazuh by using a Python script
Finally, you'll leverage Wazuh's Active Response functionality to automatically quarantine the host (and prevent it from exfiltrating data)
In this course, you will simulate all attacks through Merlin (a popular C2 service) so we can emulate real-world scenarios! (No prior Merlin experience is needed)
When you're finished with this course, you'll have the skills and knowledge to detect these techniques Scheduled Task/Job (T1053), Hijack Execution Flow (T1574), and Exfiltration Over C2 Channel (T1041)
Course Instructors