From the course: How to Conduct a Phishing Email Investigation

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Challenge: Which artifact(s) is suspicious?

Challenge: Which artifact(s) is suspicious?

From the course: How to Conduct a Phishing Email Investigation

Challenge: Which artifact(s) is suspicious?

(bright upbeat music) - [Instructor] In this chapter, we've specifically covered analyzing the indicators of a compromise. Using the previously mentioned resources, which of the following six artifacts are suspicious? Warning, the URLs are padded for your safety. When removing the brackets do not accidentally click the links. Some are active resources that are malicious.

Contents