Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading Events

« All Events

Event Series Event Series: Snake Oil? Summit 2023

Advanced Endpoint Investigations

December 8 @ 10:00 am – 6:00 pm EST

Instructor: Alissa Torres
Course Length: 16 Hours

Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.

Advanced Endpoint Investigations

Pricing:

$575 per person
Tags
Advanced Endpoint Investigations, Alissa Torres, Snake Oil? Summit 2023, Summit Training
Event Categories:
Live, Virtual

Location:

Online

  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live

This class is part of the Antisyphon Snake Oil? Summit 2023. Registration for any Snake Oil? Summit class includes registration for the summit and all of its presentations, talks, and streams.

Register Here!

Clicking on the button above will take you
to our registration form on Cvent.


Course Description

For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint data.

This course focuses on four core investigative competencies: endpoint data collection, investigative triage, incident response pivots, and root cause analysis.

Key Takeaways

Learning Objectives: 

  • Gain fundamental knowledge of modern Windows and Linux host artifacts. 
  • Explain logical investigative workflows for host pivoting, data collection, and analysis. 
  • Develop an understanding of use cases for incident response host pivots and root cause analysis. 

Performance Objectives: 

  • Develop host triage collection and analysis skills for effective investigations of Windows and Linux systems. 
  • Properly identify file system, OS, and memory artifacts to support timeline creation and attack path reconstruction. 
  • Build deductive reasoning and investigative prowess through hands-on exercises built around real-world scenarios. 

Who Should Take This Course

  • Security Operations/Incident Response Analysts 
  • Threat Hunters 
  • Tactical Threat Intel Analysts 
  • Digital Forensics Investigators 
  • Red teamers who want to perfect their operational discipline 

Audience Skill Level

  • Basic understanding of Windows and/or Linux OS fundamentals 
  • Familiarity with attack path models, threat actor frameworks, and hunt methodologies 

Student Requirements

  • 1-2 years of experience in security operations, incident response, or threat hunting. 

System Requirements

  • Stable Internet access 
  • x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization  
    (Apple Silicon is currently not supported) 
  • A computer with at least 8 GB of RAM. 16 GB is recommended 
  • VMWare Workstation or VMWare Fusion 
    (VirtualBox and other VM software is not supported) 
  • Windows 10/11, MacOSX+, or a currently supported Linux Distribution  
  • Full Administrator/root access to your computer or laptop 
  • System must also have at least 80GB of available disk space, 2 vCPUs, and be able to connect to a wireless network for Internet access. 

Trainer & Author

Alissa Torres

Alissa Torres is a blue team practitioner/educator turned consultant, laser-focused on the people element of the SecOps equation. With 3 dog-years of experience spanning roles in active and passive IT and security operations, she discovered her passion for adversary hunt while serving in the trenches as an incident analyst with a third-party remediation services company, and later, leading an incident response team for a global manufacturing company. As a seasoned presenter, Alissa shares insights from her real-world experiences but she certainly hopes your mileage varies (dramatically, in some cases) from her own.

Online


Related Events

  • Secure Ideas - Introduction to PCI (PCI 101)

    Introduction to PCI (PCI 101)

    October 3 @ 12:00 pm – 4:00 pm EDT Event Series
  • Secure Ideas - Professionally Evil CISSP Mentorship

    Professionally Evil CISSP Mentorship Program

    October 3 @ 2:00 pm – 4:00 pm EDT Event Series
  • Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation

    October 4 @ 12:00 pm – 4:00 pm EDT Event Series

Event Navigation

  • « x86_32 Assembly and Shellcode-Lab for Linux
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme