Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

Estrella Mountain Community College Network Security Monitoring and Threat Hunting PPT

Estrella Mountain Community College Network Security Monitoring and Threat Hunting PPT

Estrella Mountain Community College Network Security Monitoring and Threat Hunting PPT

Description

The purpose of this assignment is to identify tools and processes that can be used to evaluate external threats.

Network security professionals and incident responders who will be using security and logging products will use threat hunting to assist with their network and endpoint hunting responsibilities.

The SOC analysts must use a specific approach to guide their hunting across typical security toolsets such as SIEM, packet capture, and endpoint detection response (EDR). These tools can help the analyst acquire useful data used in the threat hunting mission.

Threat hunters are responsible for enterprise situational awareness and continuous surveillance, including monitoring traffic, blocking unwanted traffic to and from the Internet, and detecting any type of attack. Point solution security technologies are the starting point for hardening the network against possible intrusion attempts.

Part 1

Use Kali Linux Wireshark to perform a deep packet analysis of the traffic on the SOC-in-box infrastructure. Assume this traffic represents the corporation you selected from the “Company Profiles.”

Identify the protocol hierarchy.

What percent of the traffic is TCP? ICMP? ARP? UDP?

  • Look at the I/O graphic in a bar-graph format.
  • Observe at least three Wireshark captures for analysis.
  • Part 2
  • Use Kali Linux and a command line terminal to access two log files to form a threat hunting scenario. You should be able to navigate to log files on any of the VMs within the SOC-in-a-box infrastructure, including the intrusion detection system (IDS).

What is the size of the log file?

Provide an output with the number of lines in the chosen log file.

Identify and describe the structure of the log file.

  • Determine users and logins. Can user login patterns be analyzed?
  • What are the IP addresses?
  • Add screenshots and explanation of threat hunting analysis to a Word document.
  • Part 3
  • In 500–750 words, summarize the following. This will be the Threat Hunting section in the IT Proposal.
  • Define the goals and responsibilities of a cyber threat hunting team and articulate its value to an organization

Explain how a SOC analyst can leverage use cases for threat hunting programs while building hunt missions for an organization.

Evaluate common threat hunting concepts, approaches, and tools.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20