Palo Alto Networks Cybersecurity Academy
📨

Alert Received

200 alerts in queue
⚠️ SECURITY ALERT: Suspicious Email Reported

Alert ID: SEC-2024-0847

Type: Phishing Email

Reported By: Sarah Thompson (Marketing)

Time: 9:23 AM

Status: Unassigned

📧

Email Analysis

Searching email security system...

🔍

WHOIS Domain Lookup

Querying WHOIS database for acme-verify.com...

📜

Web Proxy Log Search

Searching proxy logs for acme-verify.com...

🔒

Authentication Logs & Response

Searching authentication logs for mike.torres...

📋

Investigation Timeline

MTTD 36 min Time to Detect
MTTR 52 min Time to Respond

Click each event to review what you discovered:

8:47 AM
📧 Phishing Email Sent

Attacker sends email to all employees

Click to review
9:12 AM
👁 Sarah Clicks Link

Views page but doesn't enter credentials

Click to review
9:15 AM
👁 Lisa Clicks Link

Views page but doesn't enter credentials

Click to review
9:23 AM
🔔 Alert Generated MTTD: 36 min

System detects suspicious email, creates alert

Click to review
9:41 AM
🔒 Mike Enters Credentials

Submits username and password to fake site

Click to review
9:47 AM
🚨 Attacker Logs In

Russian IP uses Mike's stolen credentials

Click to review
10:15 AM
✅ Incident Resolved MTTR: 52 min

Containment, eradication, and recovery complete

Click to review

Explore the timeline: 0/7 events reviewed

36 min
MTTD - Mean Time to Detect
From phishing email to alert
52 min
MTTR - Mean Time to Respond
From detection to response
199
Alerts Still Waiting
Manual analysis is slow...
28 min
Attacker Access Time
From login to lockout
📝

Knowledge Check

Silver Level
Incident Responder Certificate
Security Operations Fundamental Series - Module 4
Your Name

Successfully completed the phishing investigation training

🏆 Congratulations!

You've successfully completed your first phishing investigation! You learned how to:

  • Analyze suspicious emails for phishing indicators
  • Use WHOIS to investigate suspicious domains
  • Search web proxy logs to find who clicked malicious links
  • Check authentication logs for unauthorized access
  • Make quick decisions during an active compromise