Incident Response & Forensic Investigation are constantly evolving, crucial topics in the area of cybersecurity. In order to stay ahead of cyber-criminals, the knowledge of Individuals and Teams responsible for Incident Response, collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find the threats, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This workshop will cover the general approach to threat monitoring, incident response readiness as well as the important aspects of Windows internals. The training will also include hands-on exercises on our custom-built lab environment. Furthermore, we grant an extra 3 weeks of lab access to the students with additional home assignments and Expert’s help if needed.

This course will be delivered by: Paula Januszkiewicz is the Founder and CEO of CQURE Inc. and CQURE Academy. She is also Enterprise Security MVP, honorable Microsoft Regional Director for CEE and a world class cybersecurity expert, consulting Customers all around the world. In 2017, Paula graduated from Harvard Business School. She is a top speaker at conferences including Microsoft Ignite (she was rated No. 1 among 1,100 speakers at a conference with 26000 attendees), RSA (speaking since 2017, in 2019 she delivered a keynote at RSA USA for 40000 attendees), Black Hats (USA, Europe, Asia where she was rated No.1 speaker), keynote at LEAP 2022 and keynoting multiple times at GISEC. Her presentations gather thousands of people. In 2019, Paula’s presentation was voted best of Black Hat Asia 2019 Briefings!

hours

18

language

English

Summary

Incident Response & Forensic Investigation are constantly evolving, crucial topics in the area of cybersecurity. In order to stay ahead of cyber-criminals, the knowledge of Individuals and Teams responsible for Incident Response, collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find the threats, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This workshop will cover the general approach to threat monitoring, incident response readiness as well as the important aspects of Windows internals. The training will also include hands-on exercises on our custom-built lab environment. Furthermore, we grant an extra 3 weeks of lab access to the students with additional home assignments and Expert’s help if needed.

This course will be delivered by: Paula Januszkiewicz is the Founder and CEO of CQURE Inc. and CQURE Academy. She is also Enterprise Security MVP, honorable Microsoft Regional Director for CEE and a world class cybersecurity expert, consulting Customers all around the world. In 2017, Paula graduated from Harvard Business School. She is a top speaker at conferences including Microsoft Ignite (she was rated No. 1 among 1,100 speakers at a conference with 26000 attendees), RSA (speaking since 2017, in 2019 she delivered a keynote at RSA USA for 40000 attendees), Black Hats (USA, Europe, Asia where she was rated No.1 speaker), keynote at LEAP 2022 and keynoting multiple times at GISEC. Her presentations gather thousands of people. In 2019, Paula’s presentation was voted best of Black Hat Asia 2019 Briefings!

Target Audience

All IT and Security Professionals.

Topics Covered

  1. How to Identify an Incident
  2. Handling Incidents Techniques
  3. Incident Response Plan Checklist
  4. Incident Handling Preparation
  5. Incident Response Best Practices
  6. Containment Strategy to Stop Multiple Component Incidents

  1. Types of Hunting b. Defining Hunt Missions
  2. Malware Hiding Techniques
  3. Uncovering Internal Reconnaissance
  4. Uncovering Lateral Movement
  5. Uncovering Hidden network transmissions

  1. Introduction to Windows Internals
  2. Processes and threads
  3. Effective permissions auditing
  4. Windows services
  5. Advanced techniques with Sysinternals Suite

  1. Role of Forensics Analysis in Incident Response
  2. Challenging Aspects of Digital Evidence
  3. Collecting Electronic Evidence

  1. Types and approaches to network monitoring
  2. Network evidence acquisition
  3. Network protocols and Logs
  4. Gathering data from network security appliances
  5. Detecting intrusion patterns and attack indicators
  6. Data correlation
  7. Hunting malware in network traffic

  1. Introduction to memory dumping and analysis
  2. Creating memory dump
  3. Utilizing Volatility to analyse Windows memory image

  1. Introduction to storage acquisition and analysis
  2. Drive Acquisition
  3. Autopsy
  4. Building timelines

  1. Preserving digital evidences
  2. Documentation of changes
  3. Interviews
  4. Timeline building

minimize course outline