Learning objectives

Participants will learn the basics of Incident Response and forensic investigations by way of a fictional hacker attack. Thus the seminar starts off with a scenario that is explained step by step and which is accompanied by various exercises with different technologies and systems.

As part of training, measures will be developed and subsequently implemented. This includes the analysis of log files, the definition of Indicators of Compromise (IoC), as well as the classical forensic analysis of file systems.

Demarcation: The seminar teaches incident response and forensics fundamentals deployed in conjunction with workstations and servers. Locating and resolving network anomalies is covered in the “Incident Response Networks” course.


Highlights

  • Introduction to Incident Response
  • Live Response (Memory Dumps & Information Gathering)
  • Creating and using IoC
  • Securing Evidence (imaging)
  • Chain of Custody in Forensic Analysis
  • Fundamentals of File Systems
  • Post Mortem Analysis
  • Tracks in Slack Space
  • Tracks in Office Documents
  • Email Analysis and Exchange Forensics
  • Analysis of Windows Systems
  • Log Analysis and Finding Anomalies
  • Forensic Readiness

 

The exercises will be done on www.hacking-lab.com. Following the course, the labor environment is available to the participants for 30 days more.


Target group

  • Security Officers
  • IT Managers
  • System Engineers
  • Third-level Support
  • Incident Handlers
  • SOC Team Members


Prerequisite

  • Good technical understanding
  • Good knowledge of operating systems
  • Interest in security incidents
  • Interest in the forensic process
  • Interest in bits and bytes

CALENDAR

Beer-Talk in St. Gallen: Azure Security 101

Im Sommer 2018 kündigte Microsoft an, ihre Cloud-Lösungen aus Schweizer Rechenzentren anzubieten. Viele hiesige KMUs und Grossunternehmen haben sich... Read more

Swiss Cyber Hackathon 2019 / Zurich

Simulating Real World Cyber Scenarios – Educational Cyber Competition of Defending your Environment and Attacking your Opponents Read more

Internet Security Days 2019 - Game of IT-Security

Based on the theme "Online Security", a wide conference program and an exhibition awaits you on September 26/27, 2019. New in the programme are... Read more

ALL DATES

NEWS

So leicht wird dein Handy gehackt

Die Blick-Reporterin weiss dank Ivan Bütler, warum man auch bei einer SMS von Mami kritisch sein soll. Read more

Rückblick Digitaltag 2019

Ivan Bütler von Compass Security hat einen aufregenden Digitaltag hinter sich. Seine Live Hacks am Züricher Hauptbahnhof waren ein Publikumsmagnet. Read more

Wie steht es um die Sicherheit der Schweizer Stromversorgung?

Im Bericht der Eidgenössischen Elektrizitätskommision kommt die Schweizer Stromversorgung diesbezüglich nicht gut weg. Studerus AG hat dazu Cyrill... Read more

ARCHIVES

Compass Security Blog

enOcean Security

In this post, we are going to take a closer look at the enOcean technology, how security is implemented, and if the security measures and options available are sufficient. mehr

Privilege escalation in Windows Domains (3/3)

In this last article about privilege escalation in Windows domains, we demonstrate how to extract credentials from running systems to compromise high-privileged accounts. mehr

ZUM BLOG