From the course: How to Conduct a Phishing Email Investigation
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Challenge: Which artifact(s) is suspicious?
From the course: How to Conduct a Phishing Email Investigation
Challenge: Which artifact(s) is suspicious?
(bright upbeat music) - [Instructor] In this chapter, we've specifically covered analyzing the indicators of a compromise. Using the previously mentioned resources, which of the following six artifacts are suspicious? Warning, the URLs are padded for your safety. When removing the brackets do not accidentally click the links. Some are active resources that are malicious.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.