Host-based Incident Response

Learning objectives

Participants will learn the basics of Incident Response and forensic investigations by way of a fictional hacker attack. Thus the seminar starts off with a scenario that is explained step by step and which is accompanied by various exercises with different technologies and systems.

As part of training, measures will be developed and subsequently implemented. This includes the analysis of log files, the definition of Indicators of Compromise (IoC), as well as the classical forensic analysis of file systems.

Demarcation: The seminar teaches incident response and forensics fundamentals deployed in conjunction with workstations and servers. Locating and resolving network anomalies is covered in the “Incident Response Networks” course.


Highlights

  • Introduction to Incident Response
  • Live Response (Memory Dumps & Information Gathering)
  • Creating and using IoC
  • Securing Evidence (imaging)
  • Chain of Custody in Forensic Analysis
  • Fundamentals of File Systems
  • Post Mortem Analysis
  • Tracks in Slack Space
  • Tracks in Office Documents
  • Email Analysis and Exchange Forensics
  • Analysis of Windows Systems
  • Log Analysis and Finding Anomalies
  • Forensic Readiness

 

The exercises will be done on www.hacking-lab.com. Following the course, the labor environment is available to the participants for 30 days more.


Target group

  • Security Officers
  • IT Managers
  • System Engineers
  • Third-level Support
  • Incident Handlers
  • SOC Team Members


Prerequisite

  • Good technical understanding
  • Good knowledge of operating systems
  • Interest in security incidents
  • Interest in the forensic process
  • Interest in bits and bytes

CALENDAR

Cyber Risks - Früherkennung leicht gemacht

Das SwissBoardForum lädt ein zum Spezialevent «Cyber Risks». Ivan Bütler zeigt in seinem Live Hacking, welchen Risiken unsere Infrastruktur gegenüber... Read more

Beer-Talk in Zürich: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Security Training: Secure Mobile Apps

In the 2-day course (in German) from Mai 12/13, 2020, you will learn about the most important security problems of mobile apps. Read more

ALL DATES

NEWS

Vulnerability in Abacus

Ville Koch identified a Cross-Site Scripting vulnerability in Abacus. Read more

Rein kommen wir meistens

In einem Interview in der Wirtschaftszeitung «Finanz und Wirtschaft» spricht Walter Sprenger über die Motivationsgründe und Methoden der Hacker. Read more

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

ARCHIVES

Compass Security Blog

New SMBGhost Vulnerability Affects Modern Windows Systems

A new vulnerability (CVE-2020-0796) affecting SMBv3 has been discovered. The community has started to name this vulnerability SMBGhost because everyone knows this vulnerability is present but no... mehr

Domain-Join Computers the Proper Way

When you add a new computer, it must first join the domain. If you use its future main user to do it, they'll become the owner and be able to hijack the computer to become a local administrator in... mehr

ZUM BLOG