Analyse various Host based attacks by Endpoint Monitoring solutions
Analyse various Network based attacks by Network Device monitoring solutions
Hunt Cyber Threats in a realistic enterprise environment
Collect Evidence & investigate Cyber Attacks using DFIR solutions
Visualize Protocol Level Attacks
2022-05-22