C)CSA: Certified Cyber Security Analyst
Outline:
Course Introduction
Chapter 1 - Blue Team Principles
a. Network Architecture and how it lays the groundwork
i. Defensive Network
b. Security Data Locations and how they tie together
c. Security Operations Center
i. The People, Processes, and Technology
ii. Triage and Analysis
iii. Digital Forensics
iv. Incident Handling
v. Vulnerability Management
d. Automation, Improvement, and Tuning
Chapter 1 Labs – Blue Team Principles
a. Analyze Initial Compromise Vector
b. Network Forensics
c. System Forensics
Chapter 2 - Digital Forensics
a. Investigative Theory and Processes
i. Digital Acquisition
ii. Evidence Protocols
iii. Evidence Presentation
b. Computer Forensics Laboratory
i. Protocols
ii. Processing Techniques
iii. Specialized Artifacts
c. Advanced Forensics for Today’s Exploitations
Chapter 2 Labs – Digital Forensics
a. Analysis of Captured Network Activity
b. Analysis of Captured Zip File
Chapter 3 - Malware Analysis
a. Creating the Safe Environment
b. Static Analysis
c. Dynamic Analysis
d. Behavior Based Analysis
e. What is different about Ransomware?
f. Manual Code Reversing
Chapter 3 Labs – Malware Analysis
a. Analysis of an MSFVenom Executable
b. Analysis of Locky Ransomware
c. Creating YARA Rules based on Analysis Results
d. Final Assessment
Chapter 4 - Traffic Analysis
a. Manual Analysis Principles
b. Automated Analysis Principles
i. Signatures compared to Behaviors
c. Application Protocols Analysis Principles
d. Networking Forensics
Chapter 4 Labs – Traffic Analysis
a. Traffic Analysis of a Website Defacement Attack
b. Traffic Analysis Based on IDS Alerts
c. Traffic Analysis of a ZLoader Delivery Attempt
d. Bonus: Find the Backdoor!!!
Chapter 5 - Assessing the Current State of Defense with the Organization
a. Network Architecture and Monitoring
b. Endpoint Architecture and Monitoring
c. Automation, Improvement, and continuous monitoring
Chapter 5 Labs – Assessing the Current State of Defense within the Organization
a. Configuring a Firewall
b. Configuring SIEM
c. Configuring IPDS
d. Upgrading Detection/Protection Capabilities
Chapter 6 - Leveraging SIEM for Advanced Analytics
a. Architectural Benefits
b. Profiling and Baselining
c. Advanced Analytics
Chapter 6 Labs – Leveraging SIEM for Advanced Analytics
a. Deploying Agent
b. Implementing User Behavior Analytics through Machine Learning
c. Simulate an Attack and Analyze Alerts
Chapter 7 - Defeating the Red Team with Purple Team tactics
a. Penetration Testing with full knowledge
i. Reconnaissance
ii. Scanning
iii. Enumeration
iv. Exploitation
v. Lateral Movement
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date