1. Network Threat Investigation Introduction
- Network Attack Introduction
- Hunting Network Threats in the Enterprise
2. Investigation and Mitigation of Email Malware Threats
- Examining Email Malware Threats
- Investigating and Verifying Email Malware Threat Mitigation
3. Investigation and Mitigation of Email Phishing Threats
- Examining Email Phishing Attacks
- Configuring Cisco ESA for URL and Content Filtering
- Investigating and Verifying Email Phishing Threat Mitigation
4. Investigation and Mitigation of Data Exfiltration Threats
- Exploiting Vulnerable Network Servers
- Investigating Data Exfiltration Threats
- Mitigating and Verifying Data Exfiltration Threats
5. Investigation and Mitigation of Malware Threats
- Examining Endpoint Malware Protection
- Investigating and Mitigating Endpoint Malware Threats
Lab Outline
- Connecting to the Lab Environment
- Threat Scenario 1—Email Malware Attachments
- Threat Scenario 2—Email-Based Phishing
- Threat Scenario 3—Targeted Network Server Threats and Data Exfiltration
- Threat Scenario 4—Endpoint Malware Investigation and Mitigation