Why Attend
It costs enterprises worldwide billions of dollars annually to respond to malware, and particularly Ransomware, attacks. So it is increasingly necessary to understand how such software behaves. Ransomware spreads very quickly and is not stealthy; as soon as your data become inaccessible and your systems unstable, it is clear something is amiss. Beyond detection and response, when prevention has failed, understanding the nature of malware, its functional requirements, and how it achieves its goals is critical to being able to rapidly reduce the damage it can cause and the costs of eradicating it.
Instructor-led training that uses interactive learning methods, including class discussion, small group activities, and role-playing
Identify network security threats against infrastructure and build defensible networks that minimize the impact of attacks; Utilize tools to analyze a network to prevent attacks and detect the adversary; Decode and analyze packets using various tools to identify anomalies and improve network defenses; Understand how the adversary compromises systems and how to respond to attacks using the six-step incident handling process; Perform penetration testing against an enterprise to determine vulnerabilities and points of compromise; Use various tools to identify and remediate malware across your enterprise
n/a
Day 1
Definsible Network Architichuer
Security Standards and Audit
Authentication, Authorization, and Accounting
Defending Network Infrastructure
Intrusion Prevention Systems and Firewalls
Name Resolution Attacks and Defense
Securing Private and Public Cloud Infrastructure
Day 2
Penetration Testing
Penetration Testing Scoping and Rules of Engagement
Online Reconnaissance
Social Engineering
Network Mapping and Scanning Techniques
Enterprise Vulnerability Scanning
Network Exploitation Tools and Techniques
Post-Exploitation and Pivoting
Web Application Exploitation Tools and Techniques
Reporting and Debriefing
Day 3
Security Operation Foundation
Network Security Monitoring
Advanced Packet Analysis
Network Intrusion Detection/Prevention
Writing Signatures for Detection
Network Forensics and More
Event Management Introduction
Continuous Monitoring
Logging and Event Collection and Analysis
SIEM and Analytics
Day 4
Digital Forensics and Incident Response
Active Defense
DFIR Core Concepts: Digital Forensics
DFIR Core Concepts: Incident Response
Modern DFIR
Widening the Net: Scaling and Scoping
Day 5
Malware Analysis
Introduction to Malware Analysis
Malware Analysis Stages: Fully Automated and Static Properties Analysis
Malware Analysis Stages: Interactive Behavior Analysis
Malware Analysis Stages: Manual Code Reversing