4) Creating and approving W
s) handling Escaiated Nos
ysk
“Task of L3 soc Analyst
» Clent Onbo arding
3 \ncident Management
a) Report ana Documentation
u) Staleeholders Communication Crechnical)
“=
* Security technologies used in soar
y TickBng 4) cloud Tools
D OU 19) 1AM /PAM
DA
YER
DIE)
§) Email ona Web goteways
DN ALOT security £
2) Vulnerabity Managemen
+ Automotion ito protect envoiteent
D TWiage
2) Enniehment
3) T\ Gakherin
y) Valdokon acfoss detection +00l
5) Close Falke : posibves
6) Emos\ users
7) Block 1OUs
$) Alert Adminstotoa
+ NIST Incident fesponse Framework
1) Prepration
2) Detection and Analysis
3) containment Eradication’ ond Recovery
4) Posk \nadend ficivity
= SANS incident _fesponse Frome werk
y Prepradion i
2) identification =
3) containment
4) Eradication
5) Recovery
e
. Eradication is used for
D Removing Artifacts
2) Identity ALL Hosts
3) Up dokang configuration
4) Pokcnes
5) Porumentation
E Recove E
y Restoravon
2) Normal operoxions
5) Actives
DE Monitora
5) Documaen Lotion :
6) Prevent (ei nfechon
Lesson _leoned :
D Meeting
» SNe
5) Way forword
4) Documentation |
+ Website ko pracice : flee tue
Eeom Labs
y Cyber defendess
2) Blue tea N
3) Let def
% Cyber defenders
+ For Nebwork security We con use
1) webstrike
2) HaukE
3 Nuice Aros
* Foc molware Analysis
y HekPPF
2) MólDocio)
3) obfuscated
% Blue team ner fı
+ For Network Mälysis 4 =
1) webshel|
2) Ronsom ware
3) Moire compomis
+ For End point as ó
Y) Sysmon me
2) Brute re |
3) Compromised wordpress
, For Malware
> Ronsomuare script
y Melissa
DioveYou
for Phishipng Analysis
) Phishing Analysis \ and 2
MENS Defena
, for Molwore
» Powershe script
2) Par Analysis
+ Foe Piso
DJ Phishin Eno
2) Emo Analysis
+ For 0 Endpoint
D Tnvest ¢ ake Web Attack
à cont “Ranson wave _
+ For Nebuork
DJ Pork scan Adi)