Cyber Security Trainings | Solution Deployment | SOC Services | Project Management
Cyber Security Trainings | Solution Deployment | SOC Services | Project Management
Signed in as:
filler@godaddy.com
This course is specially designed for Cyber Security professionals who like to enhance their career by specialising in Threat Hunting and Incident response process. This is an in-depth hands-on course designed especially for Threat hunters, Incident responders, SOC Analysts and it will give them an understanding about the various advanced threats that can target/exists in an organisation and how to detect and remediate those threats. This course also covers the importance of communication during a cybersecurity incident response effort, analysing the symptoms of an incident in progress, the use of forensic tools, and the incident recovery and post-recovery processes. Completing this course, will help you prepare to become a Cybersecurity Analyst and ensure that your organization is properly insulated from risk.
Imagine yourself in this scenario. You are an Incident responder working for one of the big Banks. Your job is to detect threats as fast as possible and once they are detected, remediate them quickly to avoid further damage. You received an update from your Threat Intel group that there might be some potential state sponsored threat actors targeting your organization. Your job now is to find out if your organisation has been breached and if yes, how many assets have been compromised. Has the threat actor been successful in taking out sensitive data from your organisation? This is a very challenging scenario as these threats can always exists in your organisation without anyone’s knowledge. You need to have access to the right processes and tools to be able to successfully hunt for these threat actors and take the necessary actions to contain the assets that were affected by this threat. This course will teach you the modern processes as well as tools available for Threat Hunting so that you are in a better position to handle these scenarios. At the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them
To summarise, this advanced-level course will teach the attendees to:
• Accurately identify compromised and affected endpoints
• Understand the importance of Continuous Threat Hunting
• Perform Triage assessments and find out any potential symptoms of Data leakage and loss of system integrity.
• Learn how to Detect, Contain and Remediate incidents.
• Leverage Cyber Threat Intelligence in the Incident Response and Threat Hunting process.
Day 1: Threat Hunting Introduction
.
Day 2: Memory Forensics
Day 3: Detecting and Analysing Intrusions through Disk Analysis
Day 4: Threat Hunting and Anti-forensics Detection
Day 5: Threat Hunting Final Lab
In this lab you will be presented with a live scenario and you will be asked to build a timeline by combining all the knowledge that you have been learning in the last few days. This include Memory analysis, Disk Analysis, Prefetch Analysis, Network Artefacts Analysis, Registry analysis, Process analysis. This lab can take anytime from half a day to complete full day depending on how fast you can discover artefacts and collect evidences.
Threat hunting and incident response is an advanced level course that covers various tools and processes. It is highly recommended that the attendees should have a good working level knowledge of windows operating system. It is advisable to have some prior background and experience in Cyber Security, but it is not a must have as this course will covers the basics of IR and Threat Hunting before digging into more advanced topics and hands-on labs.
Laptop Requirements - It is highly recommended that all the attendees should bring their own laptop with the following Software/Hardware requirements:
Course Brouchure (pdf)
Download