28.4.13 Lab – Incident Handling Answers

28.4.13 Lab – Incident Handling Answers Lab – Incident Handling (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Apply your knowledge of security incident handling procedures to formulate questions about given incident scenarios. Background / Scenario Computer security incident response has become a […]
Continue reading…

 

27.2.16 Lab – Investigating an Attack on a Windows Host Answers

27.2.16 Lab – Investigating an Attack on a Windows Host Answers Lab – Investigating an Attack on a Windows Host (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab you will: Part 1: Investigate the Attack with Sguil Part 2: Use […]
Continue reading…

 

27.2.15 Lab – Investigating a Malware Exploit Answers

27.2.15 Lab – Investigating a Malware Exploit Answers Lab – Investigating a Malware Exploit (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab you will: Part 1: Use Kibana to Learn About a Malware Exploit Part 2: Investigate the Exploit with […]
Continue reading…

 

27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers

27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers Lab – Isolate Compromised Host Using 5-Tuple (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab, you will review logs that were gathered during the exploitation of a documented vulnerability to determine […]
Continue reading…

 

27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers

27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers Lab – Interpret HTTP and DNS Data to Isolate Threat Actor (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will review logs of an exploitation of […]
Continue reading…

 

27.2.10 Lab – Extract an Executable from a PCAP Answers

27.2.10 Lab – Extract an Executable from a PCAP Answers Lab – Extract an Executable from a PCAP (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Analyze Pre-Captured Logs and Traffic Captures Part 2: Extract Downloaded Files from PCAP Background / […]
Continue reading…

 

27.2.9 Lab – Regular Expression Tutorial Answers

27.2.9 Lab – Regular Expression Tutorial Answers Lab – Regular Expression Tutorial (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will learn how to use regular expressions to search for desired strings of information. Part 1: Compete the regexone.com […]
Continue reading…

 

27.1.5 Lab – Convert Data into a Universal Format Answers

27.1.5 Lab – Convert Data into a Universal Format Answers Lab – Convert Data into a Universal Format (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Normalize Timestamps in a Log File Part 2: Normalize Timestamps in an Apache Log File […]
Continue reading…

 

26.1.7 Lab – Snort and Firewall Rules Answers

26.1.7 Lab – Snort and Firewall Rules Answers Lab – Snort and Firewall Rules (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Preparing the Virtual Environment Part 2: Firewall and IDS Logs Part 3: Terminate and Clear Mininet Process Background […]
Continue reading…

 

21.4.7 Lab – Certificate Authority Stores Answers

21.4.7 Lab – Certificate Authority Stores Answers Lab – Certificate Authority Stores (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need […]
Continue reading…