This course covers FireEye-generated alerts. It provides a framework
for interpreting callbacks and the results of malware binary analysis.
Hands-on activities include analyzing alert data to determine the
significance of alerts.
After completing this course, learners should be able to:
- Distinguish FireEye alert types
- Locate and use
critical information in a FireEye alert to assess a potential
- Use indicators of compromise (IOCs) in a FireEye alert
to identify the threat on compromised hosts
Who Should Attend
Network security professionals, incident responders and FireEye
administrators and analysts who must work with alerts generated by
Completion of at least one instructor-led or web-based FireEye
deployment training course or experience administering FireEye
appliances. A working understanding of networking and network
security, the Windows operating system, file system, registry and use
of the CLI.