Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

FireEye Product Deployment and Alert Analysis Bootcamp

Learn about the deployment, installation, configuration, and administration of NX, EX, and AX products.

GK# 2331

Course Overview

TOP

In this course, you will learn about the deployment, installation, configuration, and administration of NX, EX, and AX products. This course covers the FireEye Alerts and a framework on how to interpret callbacks and malware binary analysis results.

In a hands-on lab environment, you will be presented with alert scenarios and will analyze the alert data to determine the significance of the alerts. You will also learn about incident analysis, analyzing events, how to read alerts, identify recipients of malicious emails in their network, and how to submit malware samples to the AX for deep forensic analysis.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Deploy, install, and configure a FireEye appliance
  • Administer an NX appliance
  • Identify potentially compromised hosts
  • Administrate an EX appliance
  • Identify recipients of malicious emails
  • Administrate the FX series appliances
  • Configure a file share for remote scan
  • Schedule recurring file share scans
  • Review analysis results of a network file share scan
  • Network Security (NX series) Deployment
  • Email Security (EX series) Deployment
  • Content Security (FX series) Deployment
  • Forensic Analysis (AX series) Deployment
  • Administrate an AX series appliance
  • Submit malware samples to the AX series appliance for deep inspection
  • Review analysis results for submitted malware
  • Distinguish FireEye alert types
  • Locate and use critical information in a FireEye alert to assess a potential threat
  • Use Indicators of compromise (IOCs) in a FireEye alert to identify the threat on compromised hosts

Prerequisites

TOP
  • A working understanding of networking and network security, the Windows operating system, file system, registry, and use of the CLI
  • Recommended Courses:

Who Should Attend

TOP
  • Network security professionals
  • Incident responders
  • FireEye administrators and analyst users
Course Delivery
Request this course in a different delivery format.
Enroll