Host-based Incident Response

Learning objectives

Participants will learn the basics of Incident Response and forensic investigations by way of a fictional hacker attack. Thus the seminar starts off with a scenario that is explained step by step and which is accompanied by various exercises with different technologies and systems.

As part of training, measures will be developed and subsequently implemented. This includes the analysis of log files, the definition of Indicators of Compromise (IoC), as well as the classical forensic analysis of file systems.

Demarcation: The seminar teaches incident response and forensics fundamentals deployed in conjunction with workstations and servers. Locating and resolving network anomalies is covered in the “Incident Response Networks” course.


Highlights

  • Introduction to Incident Response
  • Live Response (Memory Dumps & Information Gathering)
  • Creating and using IoC
  • Securing Evidence (imaging)
  • Chain of Custody in Forensic Analysis
  • Fundamentals of File Systems
  • Post Mortem Analysis
  • Tracks in Slack Space
  • Tracks in Office Documents
  • Email Analysis and Exchange Forensics
  • Analysis of Windows Systems
  • Log Analysis and Finding Anomalies
  • Forensic Readiness

 

The exercises will be done on www.hacking-lab.com. Following the course, the labor environment is available to the participants for 30 days more.


Target group

  • Security Officers
  • IT Managers
  • System Engineers
  • Third-level Support
  • Incident Handlers
  • SOC Team Members


Prerequisite

  • Good technical understanding
  • Good knowledge of operating systems
  • Interest in security incidents
  • Interest in the forensic process
  • Interest in bits and bytes

CALENDAR

New: Compass-Training "Internal Network and System Security" in Bern

In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more

KMU Swiss Forum 2020

The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more

secIT 2020 – das IT Frühlings-Highlight in Hannover

Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more

ALL DATES

NEWS

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

Vulnerability in totemodata

Fabio Poloni identified an XSS vulnerability in totemodata®. Read more

ARCHIVES

Compass Security Blog

Finding Active Directory attack paths using BloodHound

As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr

ZUM BLOG