
As a cyber security defender and investigator, understanding ransomware attacks is crucial for effective response.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date: WWHF Deadwood 2025 - Link at bottom.
Description
As a cyber security defender and investigator, understanding ransomware attacks is crucial for effective response.
In this workshop, participants will learn how attackers operate, set up a C2 infrastructure with Empire, and execute a simulated attack, step-by-step, from initial access all the way throughout post-exploitation phases, each student in their own Active Directory enabled lab environment.
Following, we will perform a full investigation of the scenario at hand, covering log and endpoint analysis at scale as well as data collection and digital forensics concepts. For this, the tools we are going to use are Splunk, Velociraptor and several industry-established digital forensic utilities.
Upon completion of the training, participants will have a better understanding of the steps ransomware threat actors take to achieve their objectives, as well as the best practices for detecting and ultimately preventing ransomware attacks.
System Requirements
-
Student Requirements
- RDP access
- Online Lab Provided
-
Online Lab Setup
- Live response lab: Kali Linux, Windows Hosts, Splunk, Velociraptor
- Forensic tools
- Triage data collections and memory images
Syllabus
Day 1 (Offense):
-
- Ransomware Attacks Overview
-
- Attack Techniques and Fundamentals
-
- Ransomware Attack Simulation with Empire C2
Day 2 (Defense):
-
- DFIR Investigation Methodology
-
- Ransomware Scenario Investigation
FAQ
About the Instructor

Markus Schober
"I run a blue team training company"Bio
Markus Schober is the founder of a blue team training and consulting company named Blue Cape Security. Prior to that, he served as a manger and Principal Security Consultant at IBM X-Force Incident Response. Over the past decade he has led numerous cyber security breach investigations for major organizations, where he specialized in Incident Response, Digital Forensics and Crisis Management.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2025.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: Intro to Active Directory with Dale Hobbs
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Intro to Virtualization with Daniel Lowrie
View Course This product has multiple variants. The options may be chosen on the product page