INCIDENT ANALYSIS
ISH CERTIFICATE “INCIDENT ANALYSIS”
DELIVERY: CLASSROOM // DURATION: 3 DAYS
This course is a practical Incident Analysis workshop, that puts one’s mind on the analysis of Windows systems including a bit of network traffic and that contains several hands-on exercises. It is a course that serves as an introduction to many areas which are relevant for an Incident. Topics like Incident Handling and the Incident Response Process are not part of the course.
UPCOMING SESSIONS
Dates | Location | Language | Member/WBP | Non-Member |
---|---|---|---|---|
Apr 23 – 25, 2018 | Munich Airport | German/English | tbd. | € 1.990,- € |
Sep 11 – 13, 2018 | Munich Airport | German/English | tbd. | € 1.990,- € |
LEARNING OBJECTIVES
- During this course, you will learn a lot about windows/malware internals, and how to;
- Identify Indicators of Compromise
- Analyze network traffic abnormalities
- Analyze hard disks and core images forensically
- Distinguish malware from harmless software
- Analyze malware (behavior)
- Correlate log data with a special Incident
TARGET AUDIENCE
- Members of a CERT
- IT-Security Officers
- Interested parties on this topic
COURSE CONTENT
Day 1
- Conceptual basics
- Analysis of network traffic:
- Connection oriented
- Based on Pattern
- Manual
- Correlation of several log sources for an accurate analysis of a certain event.
- Windows Analysis Basics:
- Windows architecture
- Analysis of relevant Event Logs
- Registry Analysis
- Malware Persistence techniques
Day 2
- File system analysis using the example of NTFS:
- Investigating and restoring deleted files
- Creation of a timeline of file system activities
- Extracting files from Disk Dump
- Malware analysis – Part 1:
- Tools and techniques of static analysis
- Analysis and practical implementation of DLL Injections
- Analysis of defective PDF- and Word-Documents
- Dynamic analysis of JavaScript
Day 3
- Malware analysis – Part 2:
- Shellcode basics
- Tools and techniques of dynamic analysis
- Dynamic analysis through Cuckoo
- Memory analysis with Volatility:
- Operating system data in RAM
- Malware Hide techniques
- Analysis of selected assault techniques
PRE-REQUISITE FOR COURSE REGISTRATION
Network and programming experience as well as knowledge about popular hacking methods are of advantage. For practical exercises, Virtual Box should be already preinstalled on the laptop.
Furthermore, the participant should have administrative rights on the host computer for potential configurations. As the majority of the exercises will take place on the Linux command line, experience in this respect is helpful, but not necessary.