-
Course
- Security
Security Analysis: Live System Processes and Files
Investigate suspicious activity using live system analysis, file inspection tools, and detection signatures. This course will teach you how to respond to and analyze malicious behavior in real-time.
What you'll learn
Cybersecurity analysts are often the first line of defense when suspicious activity arises on critical systems. In this course, Security Analysis: Live System Processes and Files, you’ll learn how to detect, analyze, and respond to live system anomalies using both manual and automated tools. First, you’ll explore techniques for analyzing running system processes and identifying active file threats. Next, you’ll decode and uncover data hiding techniques using encoding and encryption methods. Finally, you’ll utilize sandboxing and file-based signatures to automate and refine your detection capabilities. When you’re finished with this course, you’ll have the skills and knowledge needed to perform real-time investigation and defense using practical security analysis tools.
Table of contents
About the author
Owen is a security practitioner at heart, who also enjoys being able to teach others about cyber security best practices and techniques. He has recently found that doing online teaching has been one of the most fulfilling experiences in his working life. He loves being able to spread the good word of security to any and all that are willing to learn it!
More Courses by Owen