From the course: Cisco Network Security: Content and Endpoint Security

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Case study: Malware detection

Case study: Malware detection

- [Instructor] Now you've done everything you could to secure your network. You've encrypted your data while it's at rest or while in motion. You make sure that you have secure routing and switching. You're using firewalls and intrusion prevention and even placed content and endpoint security on your priority list. But now it's time to take a look at malware detection and live-threat investigation. I'm at this website malware-traffic-analysis.net and it's a great resource where you can get packet captures and examine them and learn a lot about malware analysis. I've got this packet capture and I've opened it in Wireshark. Now let's step through and we'll take a look at three simple things that indicate something is amiss. Now we'll use this as an exercise. So imagine that it's a busy day and your intrusion prevention and threat management system have thrown an alarm, and that event we've taken off and pulled it into…

Contents