FireEye AX File Analysis of Malware Step Action Document
No Thumbnail Available
Keywords
Cybersecurity , Information Technology , FireEye , Malware
Project
Authors
Hinkel, Ron
Date Submitted
2016
Material Type
Instructor and/or Advisor/Case Manager Support Materials
Secondary Material Type
Program Planning Resources
Institution
Community College of Baltimore County
Industry Partner
Dunbar Armor, Inc.
License
CC BY
Funding Source
Additional Public Access
Abstract
As part of the U.S. Department of Labor Trade Adjustment Assistance Community College and Career Training (TAACCCT) grant, CCBC created a student network operations center (SNOC) that provided the students with hands on and demonstrations of various state of the art cybersecurity hardware. One of the devices was the FireEye AX appliance. The FireEye AX device allows advanced malware to proceed – either allowing the malware to call home or run inside the virtual machines running inside the appliance. This allows the AX to operate as a threat detection platform that can monitor attacks in real time. The AX is used to protect networks against zero-day exploits and multi-protocol callbacks to keep sensitive data and systems safe. FireEye AX is used to observe and detect malicious files and sites during callbacks.
Industry (NAISC)
Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
Occupation (SOC)
Computer and Mathematical Occupations -- Computer Systems Analysts (15-1051)
Instructional Program (CIP)
Computer and Information Sciences and Support Services (11)
Credit Type
Credential Type
Certificate
Credential
Stacked/Latticed Credential Model
Associate Degree
Credential
Stacked/Latticed Credential Model
Associate Degree