Главная
Study mode:
on
1
Introduction
2
What We Will Be Covering
3
Pre Requisites
4
Introduction to FireEye Redline
5
Resources
6
Practical Demo
7
Installing / Opening FireEye Redline
8
Collecting Data with FireEye Redline
9
Using Comprehensive Collection
10
Using the Default Collector
11
Opening an Analysis Session
12
Conclusion
Description:
Explore incident response techniques using FireEye's Redline in this comprehensive tutorial video. Learn how to leverage Redline's investigative capabilities for memory and file analysis to detect signs of malicious activity and develop threat assessment profiles. Discover the process of installing and opening FireEye Redline, collecting data using both comprehensive and default collectors, and opening analysis sessions. Gain practical experience through a hands-on demonstration and understand the prerequisites and resources needed for effective incident response. Perfect for blue team members and cybersecurity professionals looking to enhance their skills in digital forensics and threat detection.

Incident Response with Fireeye - Final Hackersploit Blue Team Training

Linode
Add to list
0:00 / 0:00