This is an old revision of the document!


Cyberdefences and cyberintelligence

In this lecture we will focus on investigation of malware using dedicated software such as Bro, Security Onion, Snort, etc. We will discuss how data logs should be stored and used in analysis, what are the methodologies for forensics and how to respond in case of a security incident.

cdci.1582272953.txt.gz · Last modified: 2020/02/21 10:15 by mihai.chiroiu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0