From the course: IT Security Foundations: Network Security
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Challenge: Exploring honeypot data
From the course: IT Security Foundations: Network Security
Challenge: Exploring honeypot data
(upbeat music) - [Instructor] Let's do a challenge. Now one of the jobs of a network administrator is to investigate unusual or suspicious traffic, typically in response to a possible cyber attack, such as a malware infection or a data breach. Many times we're searching for indicators of compromise, which includes evidence related to malicious activity identified on a system or a network. In this challenge, I'll show you a few simple ways to investigate possible indicators of compromise along with a few things to look for when hunting for network threats and malicious activity. First, I'll show you where I obtain the file. Now go to malware traffic analysis, which is the site dedicated to investigating captures with malware infections. And when you take a look at this, we're going to drill down to the page 2017/01/28, and the file is right here, which if you want, you can follow along. And once you download it, you'll need the password, which is infected. Now I downloaded the file and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.