Chapter 7: Delving into Endpoint Threat Analysis
On many organizations' networks, there are lots of Windows- and Linux-based client devices. Threat actors are always looking for ways to compromise these systems and implant malware and even Remote Administrator Tools (RATs) with backdoor access. Within these operating systems are various tools and utilities that are designed to provide important data to a security professional during a security incident investigation. Gaining the knowledge and skills required to use these tools will help you on your journey as a cybersecurity professional within the industry.
Throughout this chapter, you will learn about the various components and technologies related to endpoint security that are needed to help ...
Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.