Room progress ( NaN% )
Task 1Introduction
Task 2Baselining Hardware Inventory
Task includes a downloadable file
Task 3Baselining Software Inventory
Task 4Living Off the Land
Task 5Baselining Network Traffic
Task 6Baselining Identity and Access Management
Task 7Identifying Suspicious Environment Specific Use Cases
Task includes a deployable machine
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Baselines and Anomalies room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in