28.4.13 Lab – Incident Handling Answers Lab – Incident Handling (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Apply your knowledge of security incident handling procedures to formulate questions about given incident scenarios. Background / Scenario Computer security incident response has become a […]
Continue reading…
CyberOps Associate– CA – Lab Answers
27.2.16 Lab – Investigating an Attack on a Windows Host Answers
27.2.16 Lab – Investigating an Attack on a Windows Host Answers Lab – Investigating an Attack on a Windows Host (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab you will: Part 1: Investigate the Attack with Sguil Part 2: Use […]
Continue reading…
27.2.15 Lab – Investigating a Malware Exploit Answers
27.2.15 Lab – Investigating a Malware Exploit Answers Lab – Investigating a Malware Exploit (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab you will: Part 1: Use Kibana to Learn About a Malware Exploit Part 2: Investigate the Exploit with […]
Continue reading…
27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers
27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers Lab – Isolate Compromised Host Using 5-Tuple (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab, you will review logs that were gathered during the exploitation of a documented vulnerability to determine […]
Continue reading…
27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers
27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers Lab – Interpret HTTP and DNS Data to Isolate Threat Actor (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will review logs of an exploitation of […]
Continue reading…
27.2.10 Lab – Extract an Executable from a PCAP Answers
27.2.10 Lab – Extract an Executable from a PCAP Answers Lab – Extract an Executable from a PCAP (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Analyze Pre-Captured Logs and Traffic Captures Part 2: Extract Downloaded Files from PCAP Background / […]
Continue reading…
27.2.9 Lab – Regular Expression Tutorial Answers
27.2.9 Lab – Regular Expression Tutorial Answers Lab – Regular Expression Tutorial (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will learn how to use regular expressions to search for desired strings of information. Part 1: Compete the regexone.com […]
Continue reading…
27.1.5 Lab – Convert Data into a Universal Format Answers
27.1.5 Lab – Convert Data into a Universal Format Answers Lab – Convert Data into a Universal Format (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Normalize Timestamps in a Log File Part 2: Normalize Timestamps in an Apache Log File […]
Continue reading…
26.1.7 Lab – Snort and Firewall Rules Answers
26.1.7 Lab – Snort and Firewall Rules Answers Lab – Snort and Firewall Rules (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Preparing the Virtual Environment Part 2: Firewall and IDS Logs Part 3: Terminate and Clear Mininet Process Background […]
Continue reading…
21.4.7 Lab – Certificate Authority Stores Answers
21.4.7 Lab – Certificate Authority Stores Answers Lab – Certificate Authority Stores (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need […]
Continue reading…