Back To Schedule
Monday, January 26 • 8:30am - 5:00pm
Training: Enterprise Incident Response

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Register for Training

Incident Response is a multidisciplinary approach to understanding the methodologies, techniques, and tools for both offensive and defensive security. This course introduces a tactical approach for instrumenting, alerting, and responding for enterprises. Using a combination of new tools, and uncommon techniques students will learn how to defend a network against today’s evolving threats. Real world attacks concentrate heavily on a number of methodologies including; compromising systems without depending upon standard exploits, Personal Security Product (PSP) evasion, unique stealth approaches, persistence mechanisms, and varying degrees of collection strategies. Attendees will learn how real attackers use these strategies and how to detect, alert, respond, and defend against these techniques.

Students will learn:

  1. How to manipulate enterprise tools and infrastructures in unusual ways for better security
  2. Build and employ custom logging tools for detecting lateral movement, persistence mechanisms, data targeting, and exfiltration
  3. How to provide actionable data to help decision makers
  4. Properly defend against and respond to incidents on a network
  5. Offensive mindset for defensive purposes

The following items are the topic areas that will be covered in the class:

  1. Real offensive mindsets, not penetration testing mindsets, for enterprise response
  2. Proper response mechanisms and communication
  3. Host and network indicator extraction for enterprise results
  4. Quickly gather and identify data for incident use
  5. Host logging and auditing
  6. Leveraging active directory
  7. PCAP and network intelligence extraction
  8. Advanced host and file triage capabilities
  9. Host command and process monitoring across a host

Students will get the chance to work with real “APT” tools and see the unique differences between how they are used in real attacks vs the penetration testing tools used today. These differences will help students learn how to truly detect real adversaries. The labs will be interwoven into the lecture so that students will receive a significant amount of time exercising these new skills as they learn. By the end of the class students will have spent 50% of the time in a lab environment. A significant portion of the class will be dedicated to building new tools, on the fly, to solve the challenges posed by a difficult adversary. Questions can be sent to training@attackresearch.com.

avatar for Russ Gideon

Russ Gideon

Director of Malware Research, Attack Research
Russ Gideon has many years of experience in information security, having fulfilled diverse roles from being a core component of an Incident Response operation to managing an effective Red Team. Russ excels at malware reverse engineering, which enables him to deeply understand how... Read More →

Monday January 26, 2015 8:30am - 5:00pm PST
Annenberg Community Beach House: Track 2 415 Pacific Coast Hwy, Santa Monica, CA 90402

Attendees (0)