Attack Detection and Investigation Learning Path

Attack Detection and Investigation Learning Path

Delve into the inner workings of common attack techniques. Learn how Reveal(x) detects activity related to these attacks and familiarize yourself with the best practices to protect against them.

rate limit

Code not recognized.

Attack Detections Overview
Learn the basics of Attack detections in this session.
FREE
2 min
Detections MITRE Detection Categories Intermediate Security Professional
MITRE ATT&CK Framework
Learn about the MITRE ATT&CK Framework and its applications in ExtraHop in this module.
FREE
3 min
Detections Security MITRE Detection Categories Beginner Intermediate Security Professional
Brute Force Attack
This module provides an overview of brute force attack techniques and best-practices to help prevent them.
FREE
3 min
Detections Security MITRE Detection Catalog Detection Categories Intermediate Security Professional
Brute Force Detection
In this module, learn to investigate and mitigate different types of brute force attacks.
FREE
6 min
Detections Security MITRE DNS Attack mitigation Attack prevention Intermediate Security Professional
Supply Chain Attack
This module will outline varieties of supply chain attack along with best practices to minimize their risk.
FREE
4 min
Security MITRE Vulnerability Attack mitigation Attack prevention Intermediate Security Professional
C2 Beaconing
In this module, learn about the C2 (Command and Control) Beaconing tactic and the recommended methods to protect against it.
FREE
5 min
Detections Security C&C Beaconing Detection Catalog Attack mitigation Protocols Attack prevention Command & Control (C2/C&C) Intermediate Security Professional
DNS Tunneling
In this module, learn how attackers exploit DNS queries to exfiltrate data in a DNS Tunneling attack.
FREE
5 min
Detections DNS Detection Catalog Attack mitigation Attack prevention Command & Control DNS Tunneling
HTTP Request Smuggling
Learn about HTTP request smuggling attacks, along with best practices to prevent them.
FREE
3 min
Detections HTTP Desync attack Attack prevention
Remote Code Execution (RCE)
This module provides an overview of Remote Code Execution (RCE) attacks and demonstrates how to use ExtraHop Reveal(x) to identify detections related to this type of attack.
FREE
5 min
Detections Security Vulnerability Attack mitigation Attack prevention Remote Code Execution (RCE) Intermediate Security Professional
PrintNightmare Detection
This module provides an overview of the PrintNightmare remote code execution detection and demonstrates how to use ExtraHop to identify and mitigate it.
FREE
6 min
Workflows Detections Records Packets Security Remote Code Execution (RCE) Beginner Intermediate Security Professional
SQL Injection
In this module, learn about SQL injection techniques and ways to protect against them.
FREE
4 min
MITRE Vulnerability Attack mitigation Attack prevention Security Professional
Cross-Site Scripting (XSS) Attack
In this module, learn all about Cross-Site Scripting, and discover the best practices to prevent and mitigate a cross-site scripting attack.
FREE
5 min
Detections Detection Catalog Attack mitigation Attack prevention Intermediate Cross-Site Scripting (XSS)
Malware Obfuscation
In this module, learn about the techniques used by malware authors to obfuscate their code and evade detection.
FREE
5 min
Detections Security Attack prevention Intermediate Security Professional Malware Obfuscation
Cryptomining Malware
In this module, learn about crytptomining techniques and how to protect your system.
FREE
4 min
Security Attack mitigation Attack prevention Intermediate Security Professional
Port Scanning Attack
Learn about port scanning techniques and mitigation options in this module.
FREE
3 min
Detections Vulnerability Attack mitigation Attack prevention Intermediate Security Professional
DCSync Attack
Learn about DCSync attacks, along with best practices to prevent them.
FREE
3 min
Detections Detection Catalog Vulnerability Attack mitigation Attack prevention Intermediate Security Professional Domain Controller
Ransomware Attack
In this module, gain insights into the workings of ransomware attacks, and discover the most effective methods to minimize the impact of an attack.
FREE
5 min
Detections Attack mitigation Protocols Attack prevention Intermediate Security Professional Ransomware
Ransomware Activity Detection
This module provides a summary of the Ransomware Activity Detection and demonstrates how to use ExtraHop to identify and mitigate the attack.
FREE
5 min
Detections Security Attack mitigation Attack prevention Ransomware
Remote Services Exploitation
In this module, learn about the Remote Services Exploitation attack technique and how to defend against it.
FREE
5 min
Security Attack mitigation Protocols Attack prevention Lateral Movement Remote Services Exploitation
Alternative Detection Investigation Workflows
In this module, learn how to investigate detections when additional information is unavailable.
FREE
4 min
Detections Detection Catalog Detection Categories Intermediate
Attack Detection and Investigation Learning Path Quiz
Put your cyberattack knowledge to the test with this short quiz and earn your digital badge!
FREE
no-search
Attack Detection and Investigation Learning Path Feedback Survey
FREE
no-search