The Most Offensive Con that Ever Offensived – Bypass Edition
OnlineIs it the best defense is a good offense or the best offense is a good defense? For all the defenders out there, wouldn’t it be nice to understand the mind of an offensive security professional? And for all the offensive security professionals, wouldn’t it be amazing to learn from others who think about all the best ways to bypass defenses.
Incident Response Summit
OnlineAre you prepared to handle a business email compromise? What about a large-scale breach? Confused about the processes and technologies you need to have in place to be successful? How about the personnel and their respective roles to execute various IR procedures?
Come join us at the Incident Response Summit and stay for the two-day training session. Learn how to get started on your journey!
Cyber Threat Intelligence 101 w/ Wade Wells
OnlineThe course provides a comprehensive overview of the CTI field and is perfect for anyone who wants to understand the importance of CTI and how it is used to protect organizations from cyber threats. By the end of the course, you will have a strong foundation in CTI and be able to contribute to an organization’s cyber security efforts.
Network Forensics and Incident Response w/ Troy Wojewoda
OnlineIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
Cyber Security Incident Command w/ Gerard Johansen
OnlineStudents will be guided through managing a cyber security incident through a combination of instructions and practical exercises that will leverage IR Tools and techniques. Specific focus will be on specific decisions and actions that take place during an incident, how to coordinate strategic, operational, and technical teams, addressing crisis communications and getting the organization back to normal.
Incident Response Foundations w/ Derek Banks
OnlineThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.
Advanced Endpoint Investigations w/ Alissa Torres
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint data.
Linux Disk Forensics w/ Hal Pomeranz
OnlineThis 16-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober
Instructor: Markus SchoberCourse Length: 16 Hours This class is part of the Incident Response Summit. Registration for any Incident Response Summit class includes registration for the summit and all of its presentations, talks, and streams. Clicking on the button above will take youto our registration page on the website. Pricing: Location: Course Description As a cyber...
Read more... “Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober” »
Attack-Detect-Defend (ADD) w/ Kent Ickler and Jordan Drysdale
Instructor: Kent Ickler and Jordan DrysdaleCourse Length: 16 Hours This class is part of the Incident Response Summit. Registration for any Incident Response Summit class includes registration for the summit and all of its presentations, talks, and streams. Clicking on the button above will take youto our registration page on the website. Pricing: Location: Course Description...
Read more... “Attack-Detect-Defend (ADD) w/ Kent Ickler and Jordan Drysdale” »