Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading Events

« All Events

Event Series Event Series: Snake Oil? Summit 2023

Incident Response Foundations

December 8 @ 10:00 am – 6:00 pm EST

Instructor: Derek Banks
Course Length: 16 Hours

Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.

Incident Response Foundations with Derek Banks

Pricing:

$575 per person
Tags
Blue Team, Derek Banks, Incident Response, Incident Response Foundations, Snake Oil? Summit 2023, Summit Training
Event Categories:
Live, Virtual

Location:

Online

  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live

This class is part of the Antisyphon Snake Oil? Summit 2023. Registration for any Snake Oil? Summit class includes registration for the summit and all of its presentations, talks, and streams.

Register Here!

Clicking on the button above will take you
to our registration form on Cvent.


Course Description

Are you just getting started with Incident Response (IR) and not sure where to begin? Do you need to stand up an IR program or establish a Computer Security and Incident Response Team and need to get started on the right foot?

Incident Response can be one of the most difficult aspects of Information Security and foundational skills are critical.

The goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.

We will cover the logging and monitoring capabilities necessary to be able to successfully investigate and triage an incident as well as what to do when those log sources fail. The concepts and skills introduced in this class will lay the groundwork for the next steps in the IR journey of in-depth endpoint and network forensics and analysis.

Key Takeaways

  • Fundamental concepts of Incident Response and the composition of successful IR Programs and Teams
  • Necessary components of IR Policies and Procedures
  • Network traffic monitoring options and instrumentation
  • Endpoint logging requirements and what capabilities are needed when logging fails
  • Key Active Directory Event IDs necessary to track down attacker activity
  • IR considerations for cloud resources
  • Learn how to run a successful Incident Response Tabletop Exercise

Who Should Take This Course

  • Entry level Incident Responders and Threat Hunters
  • CSIRT and SOC Management

Audience Skill Level

  • Basic computer and network knowledge

Student Requirements

  • A reliable Internet connection
  • A computer with at least 8 GB of RAM (16 GB recommended)

What Each Student Should Bring

The above computer and a smile!

What Students Will Be Provided With

  • Back Doors & Breaches card deck for Incident Response Tabletop Exercises
  • Incident Response handbook with example IR Policy and Procedure documentation.
  • 12 months of free access to our Cyber Range.

Trainer & Author

Derek Banks
Derek Banks

Derek Banks has been a Security Analyst and Penetration Tester for Black Hills Information Security (BHIS) since 2014, but he has been a part of the IT industry for his entire career. Since graduating college with a BS in Computer Information Systems, Derek has explored many different Information Technology jobs, from working at a help desk to being a network and systems administrator. He has experience in forensics, incident response, creating custom host and network-based monitoring solutions, penetration testing, vulnerability analysis, and threat modeling. Derek’s favorite aspects of working at BHIS include learning from his coworkers and helping customers better their security posture. When he isn’t participating in CTF competitions or red team engagements, Derek enjoys spending time with his family, staying physically fit, and playing the bass guitar.

Online


Related Events

  • Secure Ideas - Introduction to PCI (PCI 101)

    Introduction to PCI (PCI 101)

    October 3 @ 12:00 pm – 4:00 pm EDT Event Series
  • Secure Ideas - Professionally Evil CISSP Mentorship

    Professionally Evil CISSP Mentorship Program

    October 3 @ 2:00 pm – 4:00 pm EDT Event Series
  • Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation

    October 4 @ 12:00 pm – 4:00 pm EDT Event Series

Event Navigation

  • « x86_32 Assembly and Shellcode-Lab for Linux
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme