System Forensics and Incident Handling
Angreppsmetoder utvecklas ständigt och därmed den nödvändiga kompetensen inom operativt IT-säkerhetsarbete som bevakningsteknik och incidenthantering. För att hålla koll på angriparna måste kunskapen ständigt förbättras och uppdateras hos individer och team med ansvar för att samla in digitala bevis och hantera incidenterna.
Boka utbildning
Denna avancerade utbildning ger färdigheter som krävs för att hitta, samla in och bevara data på ett korrekt sätt, samt analysera och ta reda på så mycket om händelsen som möjligt. Detta är en intensiv praktisk kurs som täcker det allmänna förhållningssättet till kriminalteknik och incidenthantering, nätverksforensik, viktiga aspekter av Windows internals, minnes- och lagringsanalys, upptäckt av indikatorer på komprometterande aktiviteter och ett korrekt sätt att rapportera.
Målgrupp och förkunskaper
Kursen är framtagen för professionell IT-personal i Microsoft-miljö som behöver stärka sin kompetens inom cybersäkerhet med bevakningsteknik och incidenthantering.
Som deltagare förutsätts du besitta goda kunskaper inom Windows-baserad server- och nätverksteknik.
För att alltid hålla en hög kvalitet på våra kurser använder vi både engelsk- och svensktalande experter som kursledare.
Detaljerad information
Under kursen kommer dessa verktyg, mjukvaror och exempel användas:
- Belkasoft RAM Capturer
- Wireshark
- Volatility
- The Sleuth Kit® (TSK)
- Autopsy
- DumpIt
- DC3DD
- Arsenal Image Mounter
- Reclaim Me
- ReFS Images
- SysInternals Toolkit
- ShadowCopyView
- RegRipper
- Rifiuti2
- Registry Explorer/RECmd
- FullEventLogView
- EVTXtract
- Loki IOC Scanner
- Yara
- LECmd
- LinkParser
- PECmd
- SkypeLogViewer
- SQLiteBrowser
- NetWork Miner
- StuxNet Memory Dump
Kursmaterialet är på engelska, med detta innehåll:
Introduction to Incident Handling
- Types and Examples of Cybersecurity Incidents
- Signs of an Incident
- Incident Prioritization
- Incident Response and Handling Steps
- Procedures and Preparation
Incident Response and Handling Steps
- How to Identify an Incident
- Handling Incidents Techniques
- Incident Response Team Services
- Defining the Relationship between Incident Response, Incident Handling, and Incident Management
- Incident Response Best Practices
- Incident Response Policy
- Incident Response Plan Checklist
- Incident Handling Preparation
- Incident Prevention
- Following the Containment Strategy to Stop Unauthorized Access
- Eradication and Recovery
- Detecting the Inappropriate Usage Incidents
- Multiple Component Incidents
- Containment Strategy to Stop Multiple Component Incidents
Windows Internals
- Introduction to Windows Internals
- Fooling Windows Task Manager
- Processes and threads
- PID and TID
- Information gathering from the running operating system
- Obtaining Volatile Data
- A deep dive to Autoruns
- Effective permissions auditing
- PowerShell get NTFS permissions
- Obtaining permissions information with AccessChck
- Unnecessary and malicious services
- Detecting unnecessary services with PowerShell
Handling Malicious Code Incidents
- Count of Malware Samples
- Virus, Worms, Trojans and Spywares
- Incident Handling Preparation
- Incident Prevention
- Detection of Malicious Code
- Containment Strategy
- Evidence Gathering and Handling
- Eradication and Recovery
Network Forensics and Monitoring
- Types and approaches to network monitoring
- Network evidence acquisition
- Network protocols and Logs
- LAB: Detecting Data Thievery
- LAB: Detecting WebShells
- Gathering data from network security appliances
- Detecting intrusion patterns and attack indicators
- Data correlation
- Hunting malware in network traffic
- Encoding and Encryption
- Denial-of-Service Incidents
- Distributed Denial-of-Service Attack
- Detecting DoS Attack
- Incident Handling Preparation for DoS
- DoS Response and Preventing Strategies
Securing Monitoring Operations and Evidence Gathering
- Industry Best Practices
- Objectives of Forensics Analysis
- Role of Forensics Analysis in Incident Response
- Forensic Readiness And Business Continuity
- Types of Computer Forensics
- Computer Forensic Investigator
- Computer Forensics Process
- Collecting Electronic Evidence
- Challenging Aspects of Digital Evidence
- Forensics in the Information System Life Cycle
- Forensic Analysis Guidelines
- Forensics Analysis Tools
- Memory acquisition techniques
Memory: Dumping and Analysis
- Introduction to memory dumping and analysis
- Creating memory dump - Belkasoft RAM Capturer and DumpIt
- Utilizing Volatility to analyze Windows memory image
- Analyzing Stuxnet memory dump with Volatility
- Automatic memory analysis with Volatile
Memory: Indicators of compromise
- Yara rules language
- Malware detonation
- Introduction to reverse engineering
Disk: Storage Acquisition and Analysis
- Introduction to storage acquisition and analysis
- Drive Acquisition
- Mounting Forensic Disk Images
- Virtual disk images
- Signature vs. file carving
- Introduction to NTFS File System
- Windows File System Analysis
- Autopsy with other filesystems
- External device usage data extraction (USB usage etc.)
- Reviving the account usage
- Extracting data relate with the recent use of application, file etc.
- Recovering data after deleting partitions
- Extracting delete file and file related information
- Extracting data from file artifacts like $STANDARD_INFORMATION etc.
- Password recovery
- Extracting Windows Indexing Service data
- Deep-dive into Automatic Destinations
- Detailed analysis of Windows Prefetch
- Extracting information about program execution (UserAssist, RecentApps, Shimcache, appcompatcache etc.)
- Extracting information about browser usage (web browsing history, cache, cookies etc.)
- Communicator apps data extraction
- Extracting information about network activity
- Building timelines
Reporting – Digital Evidence
This module covers the restrictions and important details about digital evidence gathering. Moreover, a proper structure of digital evidence report will be introduced.