How to Investigate and Analyze Suspicious Security Alerts - A Step-by-Step Guide
Red Canary via YouTube
Overview
Learn how to systematically investigate suspicious security alerts through a practical demonstration from an experienced Incident Handler. Follow along with a detailed walkthrough of analyzing command lines, process trees, and event logs to determine whether alerts represent genuine threats or false positives. Explore key investigation steps including initial alert assessment, command line analysis, identifying suspicious patterns, and threat determination. Master essential incident response techniques through real-world examples that help develop critical thinking skills for security investigations. Gain practical knowledge for evaluating potential security incidents and making informed decisions about threat responses in enterprise environments.
Syllabus
Intro
We have an alert!
What’s the alert telling me?
What’s interesting about it?
Is it a threat?
Taught by
Red Canary