Udemy

CCNA Cyber Ops: Malware analysis using ELSA and PCAP Files

立即報名
  • 1,557 名學生
  • 更新於 6/2023
4.4
(14 個評分)
CTgoodjobs 嚴選優質課程,為職場人士提升競爭力。透過本站連結購買Udemy課程,本站將獲得推廣佣金,有助未來提供更多實用進修課程資訊給讀者。

課程資料

報名日期
全年招生
課程級別
學習模式
修業期
1 小時 25 分鐘
教學語言
英語
授課導師
Bassam Alkaff • Remote Author @ INE • CCDP, CCNPx3, VCP
評分
4.4
(14 個評分)

課程簡介

CCNA Cyber Ops: Malware analysis using ELSA and PCAP Files

Learn how to get PCAP files, use the tcpreplay command, and use ELSA to normalize. summarize, and aggregate logs

*** Part of the best selling course: CCNA Cyber Ops Tools: Sec Onion, Wireshark, and Kali Linux ***

*** The Only standalone course about ELSA (Enterprise Log Search and Archive) on Udemy***

It is estimated that there will be about 1.5 million unfilled jobs in cyber security by the year 2020. A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 million by the year 2021. In addition, recent article highlights Cisco Systems intention to become a cyber security force. For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications in demand in the near future. Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance. 

In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification. Learning the theory side is important, but the hands on side is more important, since  the main purpose of your study is to apply your knowledge in production, and since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by showing him or her how to do it, but you have to let him try and practice how to do that. Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs and install these tools, might not give you the ultimate benefit from your study . For this reason, I have created this course to teach you how to create your own home labs, and to understand the core usage and important features of the tools used in them. I believe in the saying: "Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime". If you have access to online labs, such as that offered by Cisco through their scholarship, you still need to know how to create your own home labs to continue practicing and experimenting, which is what this course will help you to achieveOn the other hand, this course will prepare you to go through these online labs quickly, and with confidence, since you will be familiar with the tools used in them.  And not just online labs, but any other hands on Cyber Ops courses, like what I intend to publish in the near future.

In this course you will learn about how to use the tcpreplay command, and where to download PCAP files that can be used with this command to recreate network packets in order to practice with malware analysis using ELSA. You will go through the steps of log normalization,log summarization, and log aggregation.

Because you will need to install and learn security onion before start working with ELSA, I have a section for that.

I hope that you will join me in this course and start your Cyber security journey. Happy learning!

課程章節

  • 6 個章節
  • 15 堂課
  • 第 1 章 Course Introduction & Overview
  • 第 2 章 Working with Security Onion
  • 第 3 章 Working with PCAP Files
  • 第 4 章 Workling with ELSA
  • 第 5 章 Assignment
  • 第 6 章 ELSA Quiz

課程內容

  • Part of the best selling course: CCNA Cyber Ops Tools: Sec Onion, Wireshark, and Kali Linux
  • How to to use the tcpreplay command
  • Where to download PCAP files
  • What is ELSA (Enterprise Log Search and Archive)
  • How to do log normalization with ELSA
  • How to do log summarization with ELSA
  • How to do log aggregation with ELSA
  • Practice malware analysis with ELSA through an assignment.
  • ELSA Quiz included.
  • Learn how to install and use Security Onion


評價

  • L
    Lucas Silva
    5.0

    A very detailed practical guide to start learning and working with malware analysis.

  • M
    Momboka
    5.0

    Great course

  • A
    Ashley Allen
    5.0

    I have learned how to use this tool to perform various operations on security logs.

立即關注瀏覽更多

本網站使用Cookies來改善您的瀏覽體驗,請確定您同意及接受我們的私隱政策使用條款才繼續瀏覽。

我已閱讀及同意