Cyber Security for IT & SOC Teams. 12 day online course.

Adapt Your IT & SOC teams performances to a new and volatile Cyber Reality

Kursusmål

The COVID-19 pandemic has forced many organizations to shift their workforce to a full work-from-home model, and move their operational activities to the digital world.
This situation has, in turn, left them more vulnerable to Cyber Attacks. Today, more than ever, IT and SOC teams must remain on high alert and be ready to fully implement new remote work practices, while maintaining defenses and protecting data from malicious attacks. The teams MUST work together to keep the company safe.
In this course, we offer your IT and SOC teams the best tools and techniques needed to adapt their performance to a new and volatile cyber reality. The students will introduce with the different ways to perform manipulation and bypass security measures in order to gain access to a sensitive service/information.

12 day online course from 9:00 - 12:30

The teacher – Idan Stambulchik

Idan is the Head of Content and a global Cyber Security Instructor at HackerU. Idan Is bachelor in Management Information System with a demonstrate history of working in the cyber security industry. Hands-on experience as a penetration tester that find different vulnerabilities in websites and mobile application. Idan is an expert in Web Application Penetration Testing and Python Programming for Security. As an instructor Idan has a worldwide experience both frontal and online courses in Israel, India and Europe counting governments, businesses etc.

Course goals and objectives:

  • Understanding the cyber-attack lifecycle to better defend your organization.
  • Helping IT and security teams in building and maintaining a secure network and system in the organization.
  • Help IT and security teams in implementing strong access control measures.
  • Helping Tier 1 SOC analysts in the process of upgrading to Tier 2 SOC analysts

Course Preparations:

  • A week before the beginning of the course, participants will be asked to join HackerU LMS, which will contain all course materials, labs and access to the live training.
    Participants will receive a link with a group code, and once approved by HackerU team, will be able to log in.
    At the day of training HackerU operations team will be available to assist in any login/technical problem.
  • It is participants’ responsibility to have a strong internet connection, headset & webcam.

Kurset henvender sig til

Target Audience Recommendations:
IT Professionals with at least 3 years of hands-on experience. SOC Analysts with at least 1 year and half of hands-on experience. Anyone who wish to defend the organization, with a hands-on experience of both Linux and Windows operation system.

Forudsætninger

This course is designed for people with an IT background skill and Experience with both Linux and Windows operation system.

Kursusindhold

Day 1: 29/9/2020


Module 01
- Virtualization

  • What is Virtualization
  • Hypervisors
  • Virtual Environment Setup
  • Virtualized Hardware
  • Virtualization Maintenance
  • Advanced Virtualization


Module 02
– Intro to Linux & Users and Permissions

  • Introduction to Linux
  • Distributions
  • File System
  • Users
  • Basic Commands
  • Editing Files
  • Linux Operators
  • Filtering Output
  • User & Group Management
  • Permissions
  • Su & Sudo
  • Monitoring Resources


Day 2: 1/10/2020


Module 03
– Linux Network Configuration & Package Management

  • Configure Network Settings
  • Network Troubleshooting
  • Debian Packages
  • Apt Packages
  • Package Management
  • Install Repository
  • Apache2
  • Telnet
  • SSH
  • FTP
  • SMB
  • SFTP


Day 3: 6/10/2020


Module 4:
Cyber Kill Chain

  • What is Information Security
  • Terminology
  • Types of Hackers
  • Hacker State of Mind
  • World of Security
  • Operation systems


Module 05
: Brute Force

  • Password Cracking
  • Passwords and hashes
  • Attack Vectors
  • Brute Force Tools
  • Dictionary Attack
  • Automation Tools


Day 4: 8/10/2020


Module 6
: DFIR Fundamentals

  • DFIR Fundamentals
  • Image Capture
  • Memory Capture
  • Forensics Tools
  • Forensic Methodologies


Day 5: 20/10/2020


Module 7
: SOC Life Cycle

  • SOC Fundamentals
  • SOC Team Responsibilities
  • Incident Prioritization
  • Vulnerability Assessment


Module 8
:  Utilizing SOAR in a SIEM Environment

  • SOAR
  • Automation Objectives
  • Successful Defense
  • Effective Usage
  • Demisto


Day 6: 22/10/2020


Module 9:
  Malware Analysis & Reverse Engineering – Static Analysis

  • Malware Analysis Introduction
  • Enumeration Techniques & Common Scanners
  • Portable Executable
  • Dynamic Link Library


Module 10:
Malware Analysis & Reverse Engineering – Dynamic Analysis

  • Dynamic Analysis Introduction
  • System Monitoring
  • Networking Monitoring
  • Malware Samples


Day 7: 27/10/2020

Module 11:
Reversing with IDA

  • Introduction to IDA
  • IDA Code Flow
  • Documentation Options
  • Patching with IDA


Day 8: 29/10/2020


Module 12
: PowerShell

  • PowerShell Fundamentals
  • PowerShell ISE
  • PowerShell Modules
  • PowerCat & Nishang
  • PowerShell to EXE


Day 9: 3/11/2020


Module 13
: Privilege Escalation

  • Windows Privileges
  • Domain Privileges
  • Windows Boot Process
  • Exploitation
  • Windows Defender ATP
  • Means of Protection


Day 10: 5/11/2020


Module 14
: Bypass SIEM Detection

  • Detection Fundamentals
  • Detection Bypass methodologies & Tools
  • External Bypass
  • Internal Bypass


Module 15
: Obfuscation

  • What is Obfuscation?
  • Types of Obfuscation
  • Packing
  • Various Tools
  • Tools Comparison
  • Multi-Layered Obfuscation


Day 11: 10/11/2020


Module 16:
Threat Hunting Vs Threat Intelligence

  • Threat Hunting
  • Threat Intelligence
  • Hunts and Cycles
  • Manual Threat Hunting
  • Threat Hunting Automation
  • Threat Hunting with Zeek


Module 17:
ELK

  • ELK Components
  • ELK installation & Configuration
  • ELK Functions
  • Threat Hunting with ELK


Day 12: 12/11/2020


Module 18:
Office Exploitation

  • VBA & Macro Injection
  • DDEAUTO Word Exploitation
  • CSV Injection
  • PowerPoint Exploitation
  • Social Engineering with SFX
  • Full Review over all the modules.

Kursusdato


Praktiske oplysninger
Pris:
kr. 37.500,- (ekskl. moms)
Kursusstart:
29 september 2020
Varighed:
12 dage (9:00 - 12:30)
Sted:
e-learning


Er I flere fra samme virksomhed, som skal på kursus? Så kan der være penge at spare med et virksomhedskursus

Læs mere om virksomhedskurser her

Andre populære kurser


Aktuelt

Cyber Security - har din virksomhed styr på det? Måske ikke så meget som I burde?

Derfor kan vi nu præsentere:
Cyber Security for IT&SOC - et 12 dages online kursus
Kurset går i dybden med Cyber Security, så du og din virksomhed bliver klædt på til at forebygge de fejl, der kan ramme overskrifterne i aviserne.
Læs mere og tilmeld dig her

Har du set vores store udbud af e-learningskurser:
Med e-learning kan du sidde i ro og mag med din PC og blive opdateret på netop det, du har brug for. Vores e-learningskurser er alle af høj kvalitet og mange af dem er certificeringskurser.
Du kan se meget mere her

Introduktion til Power BI Desktop
Få en grundig introduktion til Power BI Desktop og lær om de mange muligheder for at lave flotte interaktive og visuelle rapporter, der både virker på computer, tablet og smartphone.
Du kan se meget mere her

GDPR - Udvidet kursus med fokus på løbende drift og vedligeholdelse
Sådan drifter du GDPR-complianceprojektet efter det er implementeret. På kurset får du praktiske og konkrete råd til, hvordan du kontinuerligt sikrer dokumentation for overholdelse af GDPR og databeskyttelsesloven.
Du kan se meget mere her


Kursuslokaler udlejes med og uden PC
Har du brug for et undervisningslokale med plads til op til 15 deltagere, så kan vi tilbyde fuldt udstyrede lokaler. Pris pr. dag 3.500.- kr. Forplejning 200.- kr. pr. person pr. dag.
Inkl. i prisen er teknisk support og service. Interesseret?
Kontakt os på telefon 77 300 123 og hør mere.


Hørkær 18
2730 Herlev
Tlf: 77 300 123
Email: idgkurser@idg.dk
CVR: 65970414