Course Description
Course contents
Day 1
- MITRE ATT&CK framework
- Defensive OSINT
- Linux auditing and logging
- Windows auditing, events, logging and Sysmon
- Using Logstash as a data forwarder
- Overview of KQL and Microsoft Sentinel
- Identifying Indicators of Attack (IOA) and Indicators of Compromise (IOC)
- Detecting phishing attacks (Office macros, HTA’s and suspicious links)
- Detecting C2 traffic and beacons
- Detecting credential exploitation Part 1 (Kerberoasting, PtH)
Day 2
- Detecting credential exploitation Part 2 (PtT, DCSync)
- Creating alerts and analytical rules in Microsoft Sentinel
- Detecting lateral movement within a network (WinRM, WMI, SMB, DCOM, MSSQL)
- Detecting data exfiltration (HTTP/S, DNS, ICMP)
- Detecting persistence activities (userland methods, WMI Event Subscriptions)
- C2 Communications
Also included
We realise that training courses are limited for time and therefore students are also provided with the following:
- Completion certificate
- 14-day extended lab access after the course finishes
- Discord support channel access where our security consultants are available
Target audience
This training is suited to a variety of students, including:
- SOC analysts
- Security professionals
- Penetration testers / Red Team operators
- IT Support, administrative and network personnel
Requirements
- Understanding of networking concepts
- Previous SOC and/or pentesting experience is advantageous, but not required
- Previous experience with the Kusto Query Language (KQL) is beneficial, but not required
Hardware/Software Requirements
- Students will need to have access to a laptop and their favourite browser!
Trainers Biography
Will Hunt co-founded In.security in 2018. Will’s been in infosec since 2008 and has helped secure many organisations through technical security services and training. Will’s delivered hacking courses globally at several conferences including Black Hat and has spoken at various conferences and events. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.
Twitter : @Stealthsploit
Owen Shearing is a co-founder of In.security, a specialist UK based cyber security consultancy offering technical and training services. Owen has a strong and varied background in numerous information technology fields, dating back to 2003. In the latter decade he has held roles and been involved in projects predominately focused around offensive and adversarial techniques; the insight from which has been key in keeping up-to date with current trends to ensure skills remain sharp in an ever changing and developing field.
Owen has provided technical training to a variety of audiences at bespoke events and numerous security conferences. He keeps projects at https://github.com/rebootuser.
Twitter : @rebootuser