Attack Detection and Investigation Learning Path
Delve into the inner workings of common attack techniques. Learn how Reveal(x) detects activity related to these attacks and familiarize yourself with the best practices to protect against them.
Attack Detections Overview
Learn the basics of Attack detections in this session.
FREE
2 min
MITRE ATT&CK Framework
Learn about the MITRE ATT&CK Framework and its applications in ExtraHop in this module.
FREE
3 min
Brute Force Attack
This module provides an overview of brute force attack techniques and best-practices to help prevent them.
FREE
3 min
Brute Force Detection
In this module, learn to investigate and mitigate different types of brute force attacks.
FREE
6 min
Supply Chain Attack
This module will outline varieties of supply chain attack along with best practices to minimize their risk.
FREE
4 min
C2 Beaconing
In this module, learn about the C2 (Command and Control) Beaconing tactic and the recommended methods to protect against it.
FREE
5 min
DNS Tunneling
In this module, learn how attackers exploit DNS queries to exfiltrate data in a DNS Tunneling attack.
FREE
5 min
HTTP Request Smuggling
Learn about HTTP request smuggling attacks, along with best practices to prevent them.
FREE
3 min
Remote Code Execution (RCE)
This module provides an overview of Remote Code Execution (RCE) attacks and demonstrates how to use ExtraHop Reveal(x) to identify detections related to this type of attack.
FREE
5 min
PrintNightmare Detection
This module provides an overview of the PrintNightmare remote code execution detection and demonstrates how to use ExtraHop to identify and mitigate it.
FREE
6 min
SQL Injection
In this module, learn about SQL injection techniques and ways to protect against them.
FREE
4 min
Cross-Site Scripting (XSS) Attack
In this module, learn all about Cross-Site Scripting, and discover the best practices to prevent and mitigate a cross-site scripting attack.
FREE
5 min
Malware Obfuscation
In this module, learn about the techniques used by malware authors to obfuscate their code and evade detection.
FREE
5 min
Cryptomining Malware
In this module, learn about crytptomining techniques and how to protect your system.
FREE
4 min
Port Scanning Attack
Learn about port scanning techniques and mitigation options in this module.
FREE
3 min
DCSync Attack
Learn about DCSync attacks, along with best practices to prevent them.
FREE
3 min
Ransomware Attack
In this module, gain insights into the workings of ransomware attacks, and discover the most effective methods to minimize the impact of an attack.
FREE
5 min
Ransomware Activity Detection
This module provides a summary of the Ransomware Activity Detection and demonstrates how to use ExtraHop to identify and mitigate the attack.
FREE
5 min
Remote Services Exploitation
In this module, learn about the Remote Services Exploitation attack technique and how to defend against it.
FREE
5 min
Alternative Detection Investigation Workflows
In this module, learn how to investigate detections when additional information is unavailable.
FREE
4 min
Attack Detection and Investigation Learning Path Quiz
Put your cyberattack knowledge to the test with this short quiz and earn your digital badge!
FREE
Attack Detection and Investigation Learning Path Feedback Survey
FREE