
Mastering macOS Threat Detection and Incident Response: A Hands-On Blue Team Training
3-day in-person course
Are you ready to tackle the rising wave of macOS security threats?
This rare 3-day training equips blue teams with practical skills to monitor, detect, and respond to macOS attacks. As one of the few specialized courses in macOS security, it’s an indispensable opportunity to strengthen your defenses
With macOS adoption skyrocketing in enterprises, attackers are innovating to target this platform, shattering the myth of macOS immunity.
Key Takeaways:
(Fundamentals) Gain the latest happenings and a comprehensive understanding of macOS security fundamentals, including file systems, timestamps, security features (XProtect, Gatekeeper, TCC etc.), and how attackers bypass them.
(Monitoring & Threat Detection) Learn to set up an infrastructure for attack simulation and analyze real-time macOS endpoint telemetry to identify suspicious activity
(Incident Response) Develop essential incident response, and forensic artifact analysis skills and utilize investigation tools to minimize damage from cyberattacks.
Attendees will leave with actionable skills, lab instructions, and evidence files to tackle real-world macOS security challenges confidently.
Course Overview
Foundations of macOS Security
Deep dive into macOS security fundamentals: directories, file systems, timestamps, and common file types
Understanding Apple Platform Security features (XProtect, Gatekeeper, TCC, SIP, etc.) and their role in malware defense
Real-life case studies showcasing how attackers bypass these defenses
Security checking lifecycle of a macOS binary
Hands-on labs to solidify foundational knowledge on macOS security
Attack Simulation and Threat Detection
Gain insights into the evolving macOS threat landscape
Master macOS telemetry and the Endpoint Security Framework
Learn to set up infrastructure for attack simulation and logging
Conduct real-time threat detection using macOS endpoint telemetry
Hands-on labs to analyze macOS APT activity and gain insights on threat hunting methodologies
Incident Response, Forensic Artifacts & Malware Investigations
Master the process of triage data collection
Learn system profiling techniques for identifying anomalies
Develop skills in Apple unified log analysis
Understand how to analyze user and application activity
Data Theft & Malware Case Studies (RAT, Infostelaer etc.,)
Perform in-depth persistence analysis
Investigate process, network, and file activity
Hands-on labs providing practical experience in incident response and artifact analysis
Course Challenge & Wrap-up
Apply your newfound knowledge in a hands-on course challenge simulating a real-world threat scenario
Receive valuable resources for further practice and ongoing learning
Target Audience
SOC teams, IT Admins, DFIR teams, and system administrators seeking to strengthen their macOS security posture
Training level
All
Pre-requisites
Familiarity with macOS
Cybersecurity basics and terminology
Curiosity, Willingness, and of course, the Lab requirements too ;-)
Hardware requirements
Laptop: Macbook with M* chip
OS: macOS 13 or above with Admin rights
RAM: min. 16 GB
Storage: 100 GB
What is provided for participants?
Course Material
Step-by-Step Lab Instructions Manual
Own Homelab setup guide
Lab Artifacts for Investigations practice
Carefully curated resources for further learning
Trainer Bio
Surya Teja Masanam is a Digital Forensic Investigator and a Malware Analyst with 8+ years of experience in successfully building and running DFIR programs from scratch with SoPs and field manuals in the organizations he worked for. Currently, Surya leads the Digital Forensics & Incident Response charter at a fintech company, bringing several years of experience in handling cases involving Windows, Linux, macOS and AWS in both corporate and government bodies. Engaging, understanding, and knowledgeable technical trainer, with expertise in instructing both small and large groups across diverse industries. Surya believes evangelism should be an inherent character trait among security professionals. He has delivered trainings at renowned conferences such as Defcon Blue Team Village, Bsides Singapore, Shellcon, Vulncon, CODEBLUE JP and has also raised awareness about cybersecurity in NGOs.


Saksham Tushar specializes in various aspects of Threats, including intelligence, detection, analytics, and hunting. He has experience leading teams and collaborating with organizations such as Informatica, Microsoft, and IBM to establish multiple global Security Operations Centers. Currently, he holds the position of Head of Security Operations at CRED India. He possesses extensive expertise in developing, refining, and transitioning Threat Management programs, including Advanced MDR Operations across ASEAN & EMEA regions. Additionally, he creates threat detections and hunts and shares them with the community through analytical Notebooks.