Incident Response with Fireeye | Final Hackersploit Blue Team Training
In the 11th and final video of our Blue Team Training series, @HackerSploit covers using FireEye’s Redline for incident response. Redline provides investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile.
The full Blue Team Training series is available here.
1:00 What We Will Be Covering
1:18 Pre Requisites
2:30 Introduction to FireEye Redline
5:13 Practical Demo
5:26 Installing / Opening FireEye Redline
8:30 Collecting Data with FireEye Redline
18:30 Using Comprehensive Collection
20:24 Using the Default Collector
26:14 Opening an Analysis Session
New to Linode? Get started here with a $100 credit!
Watch Hackersploit’s Red Team Series.
Learn more about Readline
Subscribe to get notified of new episodes as they come out.
#Linode #BlueTeam #Hackersploit
Product: Linode, Blue Team, FireEye; @HackerSploit
You might also like…
How to use Multiple SSH Keys | Managing Different SSH Keys on your SystemIn this video, we’ll cover how to generate and use SSH Key Pairs for easily and securely logging into your server.
Windows Red Team Exploitation Techniques | Red Team Series 3-12This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems.
UFW Full Tutorial | HackerSploit Linux SecurityIn this video, HackerSploit will show how UFW is used through the command line, allowing you to make firewall configurations easy.
Securing Commonly Used AppsWhen deploying web applications and services, security should be evaluated throughout. A solid understanding of the fundamentals of securing these applications and services is crucial in maintaining the integrity and reliability of your services. This series works as a practical guide for anyone that wants to learn how to effectively secure commonly used and deployed […]