Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SolarWinds Hands-On Course

via Cybrary

Description

Who should take this course?

Our SolarWinds course is designed for an intermediate-level learner, someone who is a seasoned offensive security professional, SOC analyst, or Windows system administrator who wants to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have proficiency with the Linux command line.

Why should I take this course?

SolarWinds is a type of supply chain attack. Our course provides a background on the SolarWinds attack, and explains how to detect if your environment has been compromised by the malware that affected SolarWinds and how to mitigate it. Our course gives you the skills you need to protect your organization against this threat.

What makes this course different from other courses on similar topics?

This course specifically covers a critical vulnerability that could affect your organization. Ray Evans and his company CyDefe have partnered with Cybrary to bring many hands-on lab experiences that combine instruction with real-life scenarios in the areas of malware analysis, password cracking, reconnaissance, penetration testing, and network scanning.

Why should I take this course on Cybrary and not somewhere else?

Our SolarWinds course enables you to learn from one of the foremost experts in the field and ensures your readiness to recognize and mitigate this type of supply chain attack. Our on-demand format affords you the flexibility to learn at your own pace.

Tags

Syllabus

  • Introduction and Background
    • SolarWinds Course Introduction
    • Background on the SolarWinds Compromise
  • Attack Flow, Malware Analysis, Detection, and Mitigation
    • Attack Flow
    • Basic Static Malware Analysis
    • Using the MITRE ATT&CK Framework
    • Detection and Mitigation
  • Hands-On Malware Analysis
    • Overview of Malware Analysis Tools and the Lab

Online Course


SolarWinds Hands-On Course

via Cybrary
Affiliate notice

Who should take this course?

Our SolarWinds course is designed for an intermediate-level learner, someone who is a seasoned offensive security professional, SOC analyst, or Windows system administrator who wants to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have proficiency with the Linux command line.

Why should I take this course?

SolarWinds is a type of supply chain attack. Our course provides a background on the SolarWinds attack, and explains how to detect if your environment has been compromised by the malware that affected SolarWinds and how to mitigate it. Our course gives you the skills you need to protect your organization against this threat.

What makes this course different from other courses on similar topics?

This course specifically covers a critical vulnerability that could affect your organization. Ray Evans and his company CyDefe have partnered with Cybrary to bring many hands-on lab experiences that combine instruction with real-life scenarios in the areas of malware analysis, password cracking, reconnaissance, penetration testing, and network scanning.

Why should I take this course on Cybrary and not somewhere else?

Our SolarWinds course enables you to learn from one of the foremost experts in the field and ensures your readiness to recognize and mitigate this type of supply chain attack. Our on-demand format affords you the flexibility to learn at your own pace.

  • Introduction and Background
    • SolarWinds Course Introduction
    • Background on the SolarWinds Compromise
  • Attack Flow, Malware Analysis, Detection, and Mitigation
    • Attack Flow
    • Basic Static Malware Analysis
    • Using the MITRE ATT&CK Framework
    • Detection and Mitigation
  • Hands-On Malware Analysis
    • Overview of Malware Analysis Tools and the Lab