Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How to Investigate and Analyze Suspicious Security Alerts - A Step-by-Step Guide

Red Canary via YouTube

Overview

Learn how to systematically investigate suspicious security alerts through a practical demonstration from an experienced Incident Handler. Follow along with a detailed walkthrough of analyzing command lines, process trees, and event logs to determine whether alerts represent genuine threats or false positives. Explore key investigation steps including initial alert assessment, command line analysis, identifying suspicious patterns, and threat determination. Master essential incident response techniques through real-world examples that help develop critical thinking skills for security investigations. Gain practical knowledge for evaluating potential security incidents and making informed decisions about threat responses in enterprise environments.

Syllabus

Intro
We have an alert!
What’s the alert telling me?
What’s interesting about it?
Is it a threat?

Taught by

Red Canary

Reviews

Start your review of How to Investigate and Analyze Suspicious Security Alerts - A Step-by-Step Guide

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.