Course Summary
Enterprises today face the ongoing challenge of escalating adversary activity, resulting in frequent attacks and, ultimately, data loss and leakage. To effectively address these threats, organizations need cross-trained professionals who are fully prepared to contribute to CERT/CSIRT activities when needed. This course is designed for experienced technologists exploring cyber career paths and seeking hands-on experience with cutting-edge tools. This unique course covers a wide range of cybersecurity sub-disciplines, providing training in the tools and techniques used daily to defend enterprises.
The full-day course spans key topics, including defending network architecture, penetration testing, security operations, DFIR/CERT/CSIRT, and malware analysis. Participants will gain hands-on experience with real-world tools (such as Cisco routers, Covenant, Metasploit, Nessus, Nmap, Procmon, Snort, SOF-ELK, TShark, Wireshark, and more) in 25 in-class labs, demonstrating:
Active defense strategies
Attacks against network devices and corresponding defenses
Digital artifact collection
Forensic data recovery
Interactive malware behavioral analysis
Intrusion detection and Snort signature creation
Log aggregation and correlation
Manual code reverse engineering
Network forensics
Network scanning and enumeration
Packet and protocol analysis
Password cracking techniques
Super timeline analysis
System exploitation and post-exploitation pivoting
Vulnerability assessment
Web application scanning and attacks
Defending Network Protocols
You will learn about commonly used network protocols and methods to defend against protocol-based attacks. You will also gain knowledge of audit techniques, as well as the Center for Internet Security’s benchmarks and Critical Security Controls.
Defensive Infrastructure and Tactics
You will gain foundational knowledge of defensive measures for both network and cloud-based infrastructures, including common detective and preventive controls.
Digital Forensics Concepts and Application
You will learn digital forensics methodologies and develop proficiency in identifying forensic artifacts.
Incident Response Concepts and Application
You will understand the continuous incident response process, how it integrates with threat intelligence practices, and its relationship to the Cyber Kill Chain.
Interactive and Manual Malware Analysis
You will gain expertise in interactive malware behavior analysis, including using analysis tools and interpreting results. You will also learn manual malware code reversal, disassembly, decompiling, and techniques used to obfuscate malware code.
Intrusion Detection and Packet Analysis
You will learn about intrusion prevention systems, their placement, configuration, and tuning within the enterprise, and gain proficiency in responding to intrusion alerts.
Malware Analysis Concepts and Basic Techniques
You will understand various types of malware, the symptoms of infection, and methods to analyze malware safely. You will also learn about automated and static malware analysis techniques and how to interpret the results.
Network Forensics, Logging, and Event Management
You will learn how to use logs and flow data in network forensics, understand the importance of logging and event management in security operations, and how to utilize SIEM and security analytics tools effectively.
Network Security Monitoring Concepts and Application
You will gain knowledge of the devices used in SOCs to monitor networks, packet types, packet capture tools, and the practice of continuous network monitoring, including advanced issues like monitoring encrypted traffic.
Penetration Testing Application
You will learn to apply penetration testing tactics and tools to typical penetration test targets.
Penetration Testing Concepts
You will understand the scoping, rules of engagement, tools, and tactics used in penetration testing, as well as how to report findings to the intended audience.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT