This training is Sold-Out
This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms and investigate an incident throughout an enterprise.
Although the course is focused on analyzing Windows- based systems and servers, the techniques and investigative processes are applicable to all systems and applications.
The course includes detailed discussions of common forms of endpoint, network and file-based forensic evidence collection and their limitations as well as how attackers move around in a compromised Windows environment.
The course also explores information management that enriches the investigative process and bolsters an enterprise security program. Discussion topics include the containment and remediation of a security incident, and the connection of short-term actions to longer-term strategies that improve organizational resiliency.
After completing this course, learners should be able to:
- Describe the incident response process, including the threat landscape, targeted attack life cycle, initial attack vectors used by different threat actors, and phases of an effective incident response process
- Conduct system triage to answer key questions about what transpired across the enterprise during an incident
- Apply lessons learned to proactively investigate an entire environment (including metadata, registry, event logs, services, persistence mechanisms and artifacts of execution) at scale for signs of compromise
- Manage and effectively record information related to ongoing investigations and incidents
- Understand the role of the remediation phase in an enterprise investigation
- Understand how to hunt for threats using threat intelligence, anomaly detection and known threat actor techniques, tactics and procedures (TTPs)
Who Should Attend
Incident response team members, threat hunters and information security professionals.
Background in conducting forensic analysis, network traffic analysis, log analysis, security assessments and penetration testing, or security architecture and system administration. Learners must have a working understanding of the Windows operating system, file system, registry and use of the command line. Familiarity with Active Directory and basic Windows security controls, plus common network protocols, is beneficial.
What to Bring
Learners will need to bring a computer with Windows 7 or newer operating system installed, Core i5 or equivalent processor, 6 GB (preferably 8 GB) of RAM and 25 GB or more of free HDD space.
Virtual machines are acceptable provided at least 4 GB of RAM can be allocated. Learners must provide their own copies of and licenses for Windows.
Learners will receive a lab book and USB thumb drive containing all required class materials and tools.
John Atrache Senior Incident Response Consultant, FireEye Mandiant
John Atrache is a Cybersecurity Incident Responder and Strategic Advisor at FireEye Mandiant. John works closely with organizations to help them respond to major data breaches, as well as proactively prepare them in effectively responding to day-to-day security incidents. He has managed and delivered cybersecurity assessments, executive and technical tabletop exercises, cyber defense center transformational work, and enterprise incident response training for government agencies and organizations across several industries and regions.
Lovell Smith Senior Incident Response Consultant, FireEye Mandiant
Lovell Smith is a Senior Incident Response Consultant in Mandiant’s Canadian region. As part of the Incident Response team, Lovell provides emergency services to clients when a security breach occurs. He also performs threat hunting and compromise assessments for clients to determine if they may be exposed to possible intrusions or detect breaches in their early stages before they require a more urgent response.
Jess Hays Technical Instructor, FireEye Mandiant
Jess Hays is a Technical Instructor at Mandiant, a FireEye company. With 12 years of experience in the Cyber Security field, she has worked in a variety of capacities including Incident Response and Handling, but is currently specializing in Cyber Security Awareness through proactive measures and Threat Intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government Intelligence agencies.
Martin Tremblay Incident Response Manager, FireEye Mandiant
Mr. Tremblay, who has over 20 years of information technology experience, is one of the leaders of Mandiant’s Incident Response practice in Canada. He helps organizations prepare, detect and respond to security incidents and has successfully led multiple high-profile security investigations across different industries. Mr. Tremblay is also very active in offensive cyber security. He leads Red Team exercises designed to simulate realistic cyberattacks in a controlled manner in order to evaluate the defense capabilities of organizations.