FireEye AX File Analysis of Malware Step Action Document

No Thumbnail Available

Keywords

Cybersecurity , Information Technology , FireEye , Malware

Project

Authors

Hinkel, Ron

Date Submitted

2016

Material Type

Instructor and/or Advisor/Case Manager Support Materials

Secondary Material Type

Program Planning Resources

Institution

Community College of Baltimore County

Industry Partner

Dunbar Armor, Inc.

License

CC BY

Funding Source

Additional Public Access

Abstract

As part of the U.S. Department of Labor Trade Adjustment Assistance Community College and Career Training (TAACCCT) grant, CCBC created a student network operations center (SNOC) that provided the students with hands on and demonstrations of various state of the art cybersecurity hardware. One of the devices was the FireEye AX appliance. The FireEye AX device allows advanced malware to proceed – either allowing the malware to call home or run inside the virtual machines running inside the appliance. This allows the AX to operate as a threat detection platform that can monitor attacks in real time. The AX is used to protect networks against zero-day exploits and multi-protocol callbacks to keep sensitive data and systems safe. FireEye AX is used to observe and detect malicious files and sites during callbacks.

Industry (NAISC)

Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)

Occupation (SOC)

Computer and Mathematical Occupations -- Computer Systems Analysts (15-1051)

Instructional Program (CIP)

Computer and Information Sciences and Support Services (11)

Credit Type

Credential Type

Certificate
Credential
Stacked/Latticed Credential Model
Associate Degree

Educational Level

Skill Level

Quality Assurance Organization