The FireEye Network Forensics training course covers the fundamentals of network flow analysis, session analysis, application metadata analysis, and reconstruction of data from full content utilizing the FireEye Packet Capture (PX Series) and Investigation Analysis (IA Series) appliances.
By attending FireEye Network Forensics workshop, delegates will learn to:
- Describe the deployment of PX and IA in the context of FireEye products and services that may be part of the environment used for network traffic monitoring and analysis.
- Define connection, packet, and session data in context of network traffic analysis.
- Perform network traffic analysis using the PX and IA.
- Reconstruct files or artifacts from full network packet data from resulting session data events using PX and IA.
- Follow threat alerts from integrated FireEye systems (EX, NX,HX, PX) and intelligence feeds (FireEye Threat Intelligence and other) that aid in the breach investigation and hunting processes.
- A working understanding of networking and network security, the Windows operating system, file system, registry and use of the command line interface (CLI).
The FireEye Network Forensics class is ideal for:
- Network security professionals and incident responders who must work with FireEye Packet Capture and Investigation Analysis appliances to analyze cyber threats through packet data.
