Forensic Analysis (AX Series) Deployment [ILT]

Version 9

    Courses cannot be purchased or accessed from this site. If you would like to register for this course, please contact your FireEye account manager.

    This page describes the instructor-led training (ILT) version of Forensic Analysis (AX Series) Deployment. For the web-based version of the course, please refer to Forensic Analysis (AX Series) Deployment [WBT] .

    This information is also available as a downloadable data sheet.

    FireEye Malware Analysis (AX Series) provides a secure environment to test, replay, characterize, and document advanced malicious activities. AX shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.

     

    This half-day course is a primer on AX, covering deployment options, basic administration, and core functionality. Hands-on activities include appliance administration and submitting malware samples to AX for deep forensic analysis.

     

    This course is the recommended starting point for anyone who uses an AX.

     


     

    Course Objectives

    Upon completion of the course the learner should be able to:

    • Deploy, install, and configure AX
    • Administer an AX appliances
    • Submit malware samples to AX for deep inspection
    • Review analysis results for submitted malware

     

    Course Outline

    1. FireEye Core Technology
      • Malware infection cycle
      • MVX engine
      • Appliance analysis phases
    2. Appliance Administration
      • Appliance updates
      • Role-based access and user accounts
      • Malware event notifications
      • System notifications
      • Reporting
      • Back-ups
    3. Forensic Analysis
      • Primary functions of AX
      • AX deployment
      • Initial AX configuration
      • FireEye AX Web UI and dashboard
      • Setting up file shares and scheduling batch analysis
      • Submitting malware samples and specifying analysis parameters
      • Reviewing analysis results for submitted malware

     

    Lessons are typically a blend of lecture and hands-on lab activities.

     

    Prerequisites

    A working understanding of networking and network security, the Windows operating system, file system, registry, and use of the CLI.

     

    Target Audience

    Network security professionals and incident responders; FireEye Admin and Analyst users.