DESCRIPTION
This scenario is designed as a guide to:
Carry out the Detection and Analysis phase in the Incident Response process.
Assess the ability of security analysts to analyze logs in order to detect attacks on the company's network.
OBJECTIVES AND EXPECTED OUTCOMES
This scenario is structured as a challenge to:
Examine various log sources from multiple machines to identify attacks occurring within the company's network.
PREREQUISITES
There are no specific prerequisites recommended for this scenario.
RECOMMENDED REFERENCES
There are no recommended reading sources.
AUTHOR
This scenario was prepared by CYBER RANGES.
DESCRIPTION
This scenario is designed as a guide to:
Carry out the Detection and Analysis phase in the Incident Response process.
Assess the ability of security analysts to analyze logs in order to detect attacks on the company's network.
OBJECTIVES AND EXPECTED OUTCOMES
This scenario is structured as a challenge to:
Examine various log sources from multiple machines to identify attacks occurring within the company's network.
PREREQUISITES
There are no specific prerequisites recommended for this scenario.
RECOMMENDED REFERENCES
There are no recommended reading sources.
AUTHOR
This scenario was prepared by CYBER RANGES.
Need Any Technology Solution