
Complexity is the enemy of security. This is especially true in crisis. When responding to a cybersecurity incident, you need a simple, effective, repeatable plan. In this course, we’ll discuss the three primary threat vectors, outline the two most important IR playbooks, and review the two most critical IT assets: identity and endpoint.
Live Training $295.00
Course Length: 8 Hours
Includes a Certificate of Completion
Next scheduled date: April 3rd, 2026 @ 10:00 AM EDT
Description
Complexity is the enemy of security. This is especially true in crisis. When responding to a cybersecurity incident, you need a simple, effective, repeatable plan.
In this course, we’ll discuss the three primary threat vectors, outline the two most important IR playbooks, and review the two most critical IT assets: identity and endpoint. Then we’ll roll up our sleeves and practice identity and endpoint investigations, including forensic-artifact selection and acquisition, rapid processing, and prioritized investigative workflow in the context of a real-world business compromise.
We’ll discuss Active Directory and M365 Identity; Windows; and Linux OS “attack surface;” and get hands-on experience performing rapid endpoint investigations using PowerShell, Velociraptor offline collector, KAPE, and csv/xlsx output analysis.
-
System Requirements
- A computer with a web browser. All lab VMs are cloud-hosted.
Syllabus
Developing a Tactical IR Plan
· The Three Threat Vectors
· The Two Most Important IR Playbooks
· Asking the Right Incident-Response Questions
Identity Attack Surface
· Identity: Your Most Critical IT Asset
· M365 Identity Overview
· Active Directory for IR Overview
Endpoint Attack Surface
· Understanding How Threat-Actors/Malware Impact Endpoints
· Windows Attack Surface
· Linux Attack Surface
Rapid Endpoint Investigations Methodology
· Endpoint Artifact Selection
· Endpoint Artifact Acquisition
· Investigative Workflow
Rapid Endpoint Investigations Tools & Techniques
· Tools & Techniques Overview
· Building an Artifact Collector (lab)
· Parsing Triage Data (lab)
Case Study: Business Compromise Investigation
· Reviewing Identity Indicators (lab)
· Investigating Endpoint Artifacts (lab)
· Deriving Actionable Intelligence (lab)
· Answering the Right Incident-Response Questions
Conclusion
· Workflow and Tooling Review
· Reference and Additional Resources
FAQ
The course content is designed to help IT/Security Analysts develop and/or improve their tactical incident-response process and capabilities.
Intermediate
Basic understanding of Identity, Windows, and Linux security concepts.
· Creating a tactical IR plan
· Simplifying an incident-response workflow
· Prioritizing operating system artifact collection and review
· Using “rapid triage workflow” scripts, Velociraptor offline collector, and KAPE for rapid endpoint investigations
· Investigating a real-world business compromise case
About the Instructor
Patterson Cake
Bio
Patterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because, to paraphrase, “doing cool stuff with cool people” and “making the world a better/safer place” is exactly how he wants to spend his professional time and energy. It also helps that he has a bit of history with a couple of awesome folks that have been with BHIS for many moons. Prior to joining the team, Patterson helped build and lead a DFIR practice for an MSSP, worked as a senior security engineer for AWS Managed Services, and spent several years in enterprise cybersecurity, often healthcare related, focusing on intermingling offensive security and incident response in technical and leadership roles. Outside of work, he enjoys spending time with his family, which often involves motorcycles, outdoor sports, movies, and music.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
This event is part of the Private: SOC Summit
Incident Response Simplified
Complete Package
Live Training Patterson Cake
Virtual
- Includes certificate of participation
- 12 months access to Cyber Range
- 6 months access to class recordings via Discord
- Our appreciation
Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details to come.
Related products
-
Kevin TackettLiveOD12 Hrs
Practical OWASP TOP 10
View Course This product has multiple variants. The options may be chosen on the product page -
Markus SchoberLive16 Hrs
Ransomware Attack Simulation and Investigation for Blue Teamers
View Course -
Carrie RobertsLiveOD16 Hrs
PowerShell for InfoSec: What You Need to Know
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD16 Hrs
Enterprise Security for All
View Course This product has multiple variants. The options may be chosen on the product page

