This training can be tailored to an industry or for a defined audience, with various durations. Example topics typically include:
Threat Landscape and Incident Readiness
- Engagement Lifecycle Management
- Incident Chronology
- Incident Response Plan (and it’s relation to business continuity and disaster recovery)
- Incident Response Team and Relevant Roles
- Law & Compliance
- Record Keeping, Interim Reporting & Final Results
- Threat Assessment
- Risk Analysis
- Business Impact Assessments
- Risk Assessments and Business Impact Assessments
- Attack and compromise lifecycle
- Attack / compromise lifecycles (kill chain).
- Compromise, Disruption, Extraction of data, etc
- Legal and Jurisdictional Issues
- Ethics
- Technical vulnerability root cause identification
- Physical threats
Insider Attacks
Collecting the Initial Facts
- Building the Attack Timeline
- Understanding Investigative Priorities
Initial Development of Leads
- Define Value of Leads
- Acting on Leads
Discover the Scope of the Incident
- Examining Initial Data
- Gathering and Reviewing Preliminary Evidence
Data Collection
- Live data collection
- When to perform a live response
- Selecting a live response tool
- What to collect
- Collection best practices
- Live data collection on Microsoft Windows Systems
- Live data collection on Unix-based systems
Forensic Duplication
- Forensic image formats
- Traditional duplication
- Live system duplication
- Duplication of Enterprise assets
- Duplication of Virtual machines
Network Evidence
- Network monitoring
- Types of network monitoring
- Setting up network monitoring
- Network data analysis
- Incident Response Team Exercise
- Applied Technical Knowledge for Incident Response
- Host Analysis Techniques
- Listing processes and their associated network sockets (if any)
- Assessing patch levels on a Windows host using the command prompt
- Finding interesting files on a Windows host
Understanding Common Data Formats
- Interpret email headers, commenting on the reliability of the information contained within
- Information contained within a PKI certificate
- Encoding employed for transmission of data (e.g. web and email)
Registration Records
- Open Source Investigation and Web Enumeration
- Effective use of search engines and other open source intelligence sources to gain information about a target
- Information that can be retrieved from common social networking sites
Extraction of Document Metadata
Community Knowledge
- Ability to interpret common anti-virus threat reports
- Ability to interpret open-source research when investigating incidents, eliminating false positives
- Knowledge of popular open-source security resources (web sites, forums, etc.)
- Static Network Traffic
Data Analysis
Malware Handling
- Methods of data collection and types of data to be collected
- Designing a collection system to ensure sufficient data is collected without overwhelming capture devices
- Impact assessment of any changes to network
- Knowledge of SPAN ports, traditional network TAPs and aggregating TAPs
- Ability to estimate capture requirements during scoping.
- Consideration of appropriate capture device deployment location.
- Constraints and limitations of capture and analysis toolsets. Knowledge of different capture options (e.g. NetFlow, limited capture, full packet capture etc.)
- The ability to assure integrity and security of network after introduction of a capture device
- Provide arguments and evidence that supports the integrity of any data captured
Data Sources and Network Log Sources
- Types of data to be collected and existing data sources
- Proxy logs
- Syslogs
- Email logs
- Firewall logs
- DHCP logs
- VPN logs
- Web server logs
- Antivirus logs
- DNS logs
- Domain logs
- Windows event logs
- Internet history
- Database logs
Correlating information contained within any number of different log formats
Triage Environment
Status Analysis
Dynamic Analysis
- Dynamic Network Traffic Analysis
Incident Response Manager Actions During an Incident
- Incident Response team lead and distribute efforts
- Convey technical findings in incident response cases with upper management and stakeholders
- Report Writing
- Client management
- Containment techniques
- Evidence handling
- Communications
- Recovery and remediation (linked to an organisation’s long- and short-term strategic goals)
- On-going technical prevention
- Threat intelligence, Contextualisation Attribution and Motivation
- Industry Best Practice
Exam Preparation