Course Features
Duration
36 minutes
Delivery Method
Online
Available on
Downloadable Courses
Accessibility
Mobile, Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Teaching Type
Self Paced
Video Content
36 minutes
Course Description
Course Overview
International Faculty
Post Course Interactions
Instructor-Moderated Discussions
Case Studies, Captstone Projects
Skills You Will Gain
What You Will Learn
Finally, you'll leverage Wazuh's Active Response functionality to automatically quarantine the host (and prevent it from exfiltrating data)
First, you'll create a rule to detect malicious filesystem operations
In this course, you will simulate all attacks through Merlin (a popular C2 service) so we can emulate real-world scenarios! (No prior Merlin experience is needed)
Next, you'll uncover a rootkit through Wazuh by using a Python script
When you're finished with this course, you'll have the skills and knowledge to detect these techniques Scheduled Task/Job (T1053), Hijack Execution Flow (T1574), and Exfiltration Over C2 Channel (T1041)
You'll cover how to utilize Wazuh to respond to data exfiltration in an enterprise environment