Scroll Top

Defending Enterprises – 2022 Edition

Course Description

Updated for 2022, our immersive 2-day Defending Enterprises training is the natural counterpart to  our popular Hacking Enterprises course. From SIEM configuration oversight to monitoring, alerting and threat hunting, you’ll play a SOC  analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA’s and IOC’s from an  enterprise breach executed by the trainers. 

Whether you’re new to Kusto Query Language (KQL) or a seasoned pro, there’s plenty for you in the  2-days! Yes, we’re using Microsoft Sentinel, but the underlying threat detection theory, logic and threat hunting approach is transferable into your own environments, whatever your preferred  platform is.  

We look at the top 10 methods we use in offensive engagements and show how these can be caught,  along with numerous other examples and methods that go above and beyond these common TTPs! 

With 13 hands-on exercises you’ll gain real-world experience in the following areas: 

  • Detecting phishing attacks and living off the land techniques 
  • Detecting C2 traffic and beacons 
  • Detecting credential exploitation (Pass-the-Hash, Pass-the-Ticket, Kerberoasting, DCSync) * Detecting lateral movement (WMIC, WinRM, DCOM, MSSQL, SMB) 
  • Detecting data exfiltration (ICMP, DNS) 
  • Detecting persistence activities 
  • + much more! 

We know 2 days isn’t a lot of time, so you’ll also get 14-days FREE lab time after class and Discord  access for support.

Defending Enterprises has had major improvements over the past several months (for the 2022  edition). This includes a new section on C2 traffic and beacon detection, extra theory content around  existing subjects and improvements to the hunting query syntax (KQL) used in numerous exercises.

Course contents

Day 1  

  • MITRE ATT&CK framework 
  • Defensive OSINT 
  • Linux auditing and logging 
  • Windows auditing, events, logging and Sysmon 
  • Using Logstash as a data forwarder 
  • Overview of KQL and Microsoft Sentinel 
  • Identifying Indicators of Attack (IOA) and Indicators of Compromise (IOC) 
  • Detecting phishing attacks (Office macros, HTA’s and suspicious links) 
  • Detecting C2 traffic and beacons 
  • Detecting credential exploitation Part 1 (Kerberoasting, PtH) 

Day 2  

  • Detecting credential exploitation Part 2 (PtT, DCSync) 
  • Creating alerts and analytical rules in Microsoft Sentinel 
  • Detecting lateral movement within a network (WinRM, WMI, SMB, DCOM, MSSQL) 
  • Detecting data exfiltration (HTTP/S, DNS, ICMP) 
  • Detecting persistence activities (userland methods, WMI Event Subscriptions) 
  • C2 Communications 
Also included

We realise that training courses are limited for time and therefore students are also provided with the following: 

  • Completion certificate 
  • 14-day extended lab access after the course finishes
  • Discord support channel access where our security consultants are available

Target audience

This training is suited to a variety of students, including:

  • SOC analysts 
  • Security professionals 
  • Penetration testers / Red Team operators
  • IT Support, administrative and network personnel

Requirements

  • Understanding of networking concepts 
  • Previous SOC and/or pentesting experience is advantageous, but not required 
  • Previous experience with the Kusto Query Language (KQL) is beneficial, but not required

Hardware/Software Requirements

  • Students will need to have access to a laptop and their favourite browser!

Trainers Biography

Will Hunt co-founded In.security in 2018. Will’s been in infosec since 2008 and has helped  secure many organisations through technical security services and training. Will’s delivered hacking  courses globally at several conferences including Black Hat and has spoken at various conferences and  events. Will also assists the UK government in various technical, educational and advisory capacities.  Before Will was a security consultant he was an experienced digital forensics consultant and trainer.

Twitter : @Stealthsploit

Owen Shearing is a co-founder of In.security, a specialist UK based cyber security consultancy  offering technical and training services. Owen has a strong and varied background in numerous information technology fields, dating back to  2003. In the latter decade he has held roles and been involved in projects predominately focused  around offensive and adversarial techniques; the insight from which has been key in keeping up-to date with current trends to ensure skills remain sharp in an ever changing and developing field. 

Owen has provided technical training to a variety of audiences at bespoke events and numerous  security conferences. He keeps projects at https://github.com/rebootuser

Twitter : @rebootuser

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.