INCIDENT ANALYSIS

ISH CERTIFICATE “INCIDENT ANALYSIS”

DELIVERY: CLASSROOM // DURATION: 3 DAYS

This course is a practical Incident Analysis workshop, that puts one’s mind on the analysis of Windows systems including a bit of network traffic and that contains several hands-on exercises. It is a course that serves as an introduction to many areas which are relevant for an Incident. Topics like Incident Handling and the Incident Response Process are not part of the course.

UPCOMING SESSIONS

Dates Location Language Member/WBP Non-Member
Apr 23 – 25, 2018 Munich Airport German/English tbd. € 1.990,- €
Sep 11 – 13, 2018 Munich Airport German/English tbd. € 1.990,- €

LEARNING OBJECTIVES

  • During this course, you will learn a lot about windows/malware internals, and how to;
  • Identify Indicators of Compromise
  • Analyze network traffic abnormalities
  • Analyze hard disks and core images forensically
  • Distinguish malware from harmless software
  • Analyze malware (behavior)
  • Correlate log data with a special Incident

TARGET AUDIENCE

  • Members of a CERT
  • IT-Security Officers
  • Interested parties on this topic

COURSE CONTENT

Day 1

  • Conceptual basics
  • Analysis of network traffic:
    • Connection oriented
    • Based on Pattern
    • Manual
  • Correlation of several log sources for an accurate analysis of a certain event.
  • Windows Analysis Basics:
    • Windows architecture
    • Analysis of relevant Event Logs
    • Registry Analysis
    • Malware Persistence techniques

Day 2

  • File system analysis using the example of NTFS:
    • Investigating and restoring deleted files
    • Creation of a timeline of file system activities
    • Extracting files from Disk Dump
  • Malware analysis – Part 1:
    • Tools and techniques of static analysis
    • Analysis and practical implementation of DLL Injections
    • Analysis of defective PDF- and Word-Documents
    • Dynamic analysis of JavaScript

Day 3

  • Malware analysis – Part 2:
    • Shellcode basics
    • Tools and techniques of dynamic analysis
    • Dynamic analysis through Cuckoo
  • Memory analysis with Volatility:
    • Operating system data in RAM
    • Malware Hide techniques
    • Analysis of selected assault techniques

PRE-REQUISITE FOR COURSE REGISTRATION

Network and programming experience as well as knowledge about popular hacking methods are of advantage. For practical exercises, Virtual Box should be already preinstalled on the laptop.
Furthermore, the participant should have administrative rights on the host computer for potential configurations. As the majority of the exercises will take place on the Linux command line, experience in this respect is helpful, but not necessary.

Register here for this training:


Felix Möckel
Datenschutzbeauftragter

Wir nehmen Datenschutz ernst! Deshalb informieren wir Sie, was mit Ihren Daten geschieht:

  • Daten aus Formularen und Webseiten-Tracking können von uns zur Analyse gespeichert werden
  • Die Daten können zur Optimierung der Webseite ausgewertet werden. Das ermöglicht es uns, besser zu verstehen, wo das Interesse unserer Besucher liegt. Wir benutzen primär Hubspot für dieses Tracking (mehr dazu finden Sie in der Erklärung auf unserer Datenschutzseite, siehe unten)
  • Wir geben Ihre Daten nicht an Dritte weiter. Im Rahmen von Veranstaltungen, an denen Sie teilnehmen möchten, kann es nötig sein, dass Ihre Daten an Vertragspartner übermittelt werden.

Weitere Details dazu, was wir mit den Daten tun und nicht tun finden Sie auf unserer Datenschutzseite, oder schreiben Sie mich bei Fragen direkt an!

2017-11-22T12:11:51+00:00 November 7th, 2017|
iT-CUBE
X