India: +91 90300 10123

Whatsapp:+1 516 8586 242

India: +91 40 6050 1418

USA: +1 909 233 6006

UK: +44 (0)203 371 0077

fireeye training

fireeye training Course Content

FireEye Core Technology
  • Malware infection cycle
  • MVX Engine
  • Appliance analysis phases
NX Series Deployment
  • Correct NX network positioning
  • Deployment mode
  • Initial NX configuration
Appliance Administration
  • Appliance updates
  • Role-based access & user accounts
  • Malware event notifications
  • System notifications
  • Reporting
  • Back-ups
Content Security-EX Series
  • Deployment
  • Initial appliance configurations
  • FireEye FX Web UI & Dashboard
  • Setting up file shares for analysis
  • Running on the demand or scheduled analysis on a network file share
  • Reviewing analysis results
Content Security-FX Series
  • Deployment
  • Initial appliance configurations
  • FireEye FX Web UI & Dashboard
  • Setting up file shares for analysis
  • Running on the demand or scheduled analysis on a network file share
  • Reviewing analysis results
Central Management CM Series
  • FireEye CM Web UI & Dashboard
  • Managing NX, EX, FX & AX
  • Correlating events detected via different vectors, e.g. web & email
  • Submitting alerts detected by the EX & NX to the AX for deep analysis
Forensic Analysis-AX Series
  • Primary functions AX platform
  • AX deployment
  • Initial AX configuration
  • FireEye AX Web UI & Dashboard
  • Setting up file shares & scheduling batch analysis
  • Submitting malware samples & specifying analysis parameters
  • Reviewing analysis results for submitted malware
Call backs
  • Malware Call back alerts
  • Domain Match alerts
  • Indicators of compromise
  • Encoded traffics
  • 3436Web Infection alert
  • Honey binary
  • Second stage payloads
  • Identify common IOCs
Malware Objects
  • Malware Object alert
  • MVX engine binary analysis of the files
  • Tracing downloads through HTTP headers
  • Determine origin of the malware object downloaded
  • Identify the IOCs in malware alerts
OS Change Walk-Through
  • OS Change detail
  • Windows API
  • Windows registry
  • Code injections
  • Alternate data streams
  • Auto-run behaviour
  • Driver loading
  • User Account Control
Basics of Malware
  • Malware overview & definition
  • Motivations of malware
  • Types of malware
  • Spear phishing
  • Stages of an APT attack