Chapter 7: Delving into Endpoint Threat Analysis
On many organizations' networks, there are lots of Windows- and Linux-based client devices. Threat actors are always looking for ways to compromise these systems and implant malware and even Remote Administrator Tools (RATs) with backdoor access. Within these operating systems are various tools and utilities that are designed to provide important data to a security professional during a security incident investigation. Gaining the knowledge and skills required to use these tools will help you on your journey as a cybersecurity professional within the industry.
Throughout this chapter, you will learn about the various components and technologies related to endpoint security that are needed to help fight against malware. You will also discover various components within Windows- and Linux-based operating systems and learn how these components can be useful to a security engineer when performing an investigation into a security incident...