Events Search and Views Navigation
All Day
Malware Hunt: Demystifying the Invisible Threats (Module 3/3)
As you have learned how to demystify the behaviour of the malware in the first two modules of this course, you may want to write signatures to hunt similar malware on other hosts or want to detect/block malware command-and-control traffic at the firewall level. This module of the course will cover popular tools used for signature-based intrusion detection, but they have slightly different purposes and approaches
Find out more »