Select your country

Not finding what you are looking for, select your country from our regional selector:

Suche

people working at night

ISH Certificate “Incident Analysis”

Delivery: Classroom // Duration: 3 Days

This course is a practical Incident Analysis workshop, that puts one’s mind on the analysis of Windows systems including a bit of network traffic and that contains several hands-on exercises. It is a course that serves as an introduction to many areas which are relevant for an Incident. Topics like Incident Handling and the Incident Response Process are not part of the course.

Learning Objectives

  • During this course, you will learn a lot about windows/malware internals, and how to;
  • Identify Indicators of Compromise
  • Analyze network traffic abnormalities
  • Analyze hard disks and core images forensically
  • Distinguish malware from harmless software
  • Analyze malware (behavior)
  • Correlate log data with a special Incident

Target Audience

  • Members of a CERT
  • IT-Security Officers
  • Interested parties on this topic

Course Content

Day 1

  • Conceptual basics
  • Analysis of network traffic:
    • Connection oriented
    • Based on Pattern
    • Manual
  • Correlation of several log sources for an accurate analysis of a certain event.
  • Windows Analysis Basics:
    • Windows architecture
    • Analysis of relevant Event Logs
    • Registry Analysis
    • Malware Persistence techniques

Day 2

  • File system analysis using the example of NTFS:
    • Investigating and restoring deleted files
    • Creation of a timeline of file system activities
    • Extracting files from Disk Dump
  • Malware analysis – Part 1:
    • Tools and techniques of static analysis
    • Analysis and practical implementation of DLL Injections
    • Analysis of defective PDF- and Word-Documents
    • Dynamic analysis of JavaScript

Day 3

  • Malware analysis – Part 2:
    • Shellcode basics
    • Tools and techniques of dynamic analysis
    • Dynamic analysis through Cuckoo
  • Memory analysis with Volatility:
    • Operating system data in RAM
    • Malware Hide techniques
    • Analysis of selected assault techniques

Pre-Requisite for Course Registration

Network and programming experience as well as knowledge about popular hacking methods are of advantage. For practical exercises, Virtual Box should be already preinstalled on the laptop.
Furthermore, the participant should have administrative rights on the host computer for potential configurations. As the majority of the exercises will take place on the Linux command line, experience in this respect is helpful, but not necessary.

Interessiert? Dann nehmen Sie Kontakt auf!

Incident Response Hotline

Ein Cybersecurity Incident, bei dem Sie sofortige Hilfe benötigen?

Kontaktieren Sie unsere 24/7/365 Incident Response Hotline.