
In this 16-hour enterprise digital forensics and incident response (DFIR) training course, you will learn how to investigate real enterprise attacks end to end, using the same processes, tools, and reasoning applied in active incident response engagements.
Course Length: 16 Hours
Includes a Certificate of Completion
WWHF Deadwood 2026 - Link at bottom.
Description
In this 16-hour enterprise digital forensics and incident response (DFIR) training course, you will learn how to investigate real enterprise attacks end to end, using the same processes, tools, and reasoning applied in active incident response engagements.
By taking this course, you will learn how to:
- Investigate a full ransomware incident from initial access to impact
- Analyze network traffic, host artifacts, and log data across multiple systems
- Reconstruct attacker activity throughout the incident lifecycle
- Understand how modern ransomware campaigns unfold in real enterprise environments
- Perform hands-on DFIR analysis using industry-standard tools
- Correlate evidence across network, endpoint, and log sources
- Validate findings through evidence rather than relying on tool output alone
- Work through realistic DFIR workflows used by professional responders
- Analyze advanced post-exploitation activity in APT-style intrusions
- Identify attacker tradecraft used after initial compromise
- Recognize and investigate TTPs associated with groups like APT41, APT28, FIN7, LockBit, and ALPHV
- Understand how mature threat actors operate inside enterprise networks
- Develop strong investigative reasoning and analyst confidence
- Learn how to ask the right questions of the data
- Practice evidence-driven decision-making during complex incidents
- Gain experience most defenders rarely get outside real-world cases
All learning is delivered through hands-on labs designed to mirror real DFIR investigations, not simplified demos or theoretical walkthroughs.
By the end of the course, you will be able to confidently investigate enterprise-scale ransomware and APT intrusions, understand attacker behavior in depth, and apply high-fidelity DFIR techniques directly to your own incident response work.
-
System / VM / Lab Requirements
- Online lab environments are provided. No local setup of tools or VM installation is required.
- A second monitor is recommended but optional
Syllabus
Day 1
-
Threat Landscape: Ransomware and APT Actors
-
Enterprise DFIR Processes and Techniques
-
Ransomware Investigation Scenario
-
Network Traffic Analysis
-
Log Analysis with Splunk
-
Remote Triage with Velociraptor
-
Forensic disk and memory analysis
-
Timeline Analysis
-
Scenario debrief and reveal
-
Day 2
-
APT TTPs Overview
-
APT Investigation Scenarios
-
SSH reverse tunneling and RDP
-
In-memory execution with reflective loaders and .NET
-
Credential theft with Kerberoasting and lateral movement
-
Impair Defenses with BYOVD attack
-
-
Lessons Learned & Detection Opportunities
FAQ
This workshop is designed for security professionals who want hands-on experience investigating commonly observed incident response scenarios. Participants will strengthen their analytical skills while gaining a deeper understanding of real-world threat actor tactics and techniques encountered during modern enterprise intrusions.
The skills developed in this workshop can be applied immediately to improve incident response, forensic investigations, detection engineering, and threat hunting efforts. Whether you are a seasoned security professional or looking to further mature your incident response capabilities, this workshop provides practical insight and realistic, hands-on investigation experience.
Intermediate
This workshop requires prior basic analysis and forensic experience. Participants should have working knowledge of:
-
Windows forensic artifacts
-
Log analysis and SIEM workflows
-
Core DFIR concepts and investigative methodology
This is not an introductory or fundamentals-level course.
-
Conduct end-to-end DFIR investigations across ransomware and APT-style incidents
-
Perform hands-on analysis of host, network, and log evidence using industry-standard tools
-
Investigate real-world attacker TTPs including credential abuse, lateral movement, and persistence
-
Correlate evidence across multiple data sources to validate attacker activity and scope impact
-
Improve investigative judgment, pivoting, and decision-making during complex incidents
About the Instructor
Markus Schober
"I run a blue team training company"Bio
Markus Schober is the founder of a blue team training and consulting company named Blue Cape Security. Prior to that, he served as a manger and Principal Security Consultant at IBM X-Force Incident Response. Over the past decade he has led numerous cyber security breach investigations for major organizations, where he specialized in Incident Response, Digital Forensics and Crisis Management.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2026.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive16 Hrs
Active Directory Security and Hardening
View Course -
Joff ThyerLive16 Hrs
Enterprise Attacker Emulation and C2 Implant Development
View Course -
Markus SchoberLive16 Hrs
Ransomware Attack Simulation and Investigation for Blue Teamers
View Course -
Kevin TackettLiveOD8 Hrs
Foundational Application Security Training
View Course This product has multiple variants. The options may be chosen on the product page

