
As a cyber security defender and investigator, understanding ransomware attacks is crucial for effective response.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
As a cyber security defender and investigator, understanding ransomware attacks is crucial for effective response.
In this workshop, participants will learn how attackers operate, set up a C2 infrastructure with Empire, and execute a simulated attack, step-by-step, from initial access all the way throughout post-exploitation phases, each student in their own Active Directory enabled lab environment.
Following, we will perform a full investigation of the scenario at hand, covering log and endpoint analysis at scale as well as data collection and digital forensics concepts. For this, the tools we are going to use are Splunk, Velociraptor and several industry-established digital forensic utilities.
Upon completion of the training, participants will have a better understanding of the steps ransomware threat actors take to achieve their objectives, as well as the best practices for detecting and ultimately preventing ransomware attacks.
System Requirements
-
Student Requirements
- RDP access
- Online Lab Provided
-
Online Lab Setup
- Live response lab: Kali Linux, Windows Hosts, Splunk, Velociraptor
- Forensic tools
- Triage data collections and memory images
Syllabus
Day 1 (Offense):
-
- Ransomware Attacks Overview
-
- Attack Techniques and Fundamentals
-
- Ransomware Attack Simulation with Empire C2
Day 2 (Defense):
-
- DFIR Investigation Methodology
-
- Ransomware Scenario Investigation
FAQ
About the Instructor

Markus Schober
"I run a blue team training company"Bio
Markus Schober is the founder of a blue team training and consulting company named Blue Cape Security. Prior to that, he served as a manger and Principal Security Consultant at IBM X-Force Incident Response. Over the past decade he has led numerous cyber security breach investigations for major organizations, where he specialized in Incident Response, Digital Forensics and Crisis Management.
Related products
-
Multiple InstructorsLive
Workshop: Intro to Active Directory with Dale Hobbs
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Introduction to IP Network with John Strand
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: How to Befriend and Bedazzle Online Threat Actors with Tim Pappa
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page