Cyber Security for IT & SOC Teams. 12 day online course.

Adapt Your IT & SOC teams performances to a new and volatile Cyber Reality

Kursusmål

The COVID-19 pandemic has forced many organizations to shift their workforce to a full work-from-home model, and move their operational activities to the digital world.
This situation has, in turn, left them more vulnerable to Cyber Attacks. Today, more than ever, IT and SOC teams must remain on high alert and be ready to fully implement new remote work practices, while maintaining defenses and protecting data from malicious attacks. The teams MUST work together to keep the company safe.
In this course, we offer your IT and SOC teams the best tools and techniques needed to adapt their performance to a new and volatile cyber reality. The students will introduce with the different ways to perform manipulation and bypass security measures in order to gain access to a sensitive service/information.

12 day online course from 9:00 - 12:30

The teacher – Idan Stambulchik

Idan is the Head of Content and a global Cyber Security Instructor at HackerU. Idan Is bachelor in Management Information System with a demonstrate history of working in the cyber security industry. Hands-on experience as a penetration tester that find different vulnerabilities in websites and mobile application. Idan is an expert in Web Application Penetration Testing and Python Programming for Security. As an instructor Idan has a worldwide experience both frontal and online courses in Israel, India and Europe counting governments, businesses etc.

Course goals and objectives:

  • Understanding the cyber-attack lifecycle to better defend your organization.
  • Helping IT and security teams in building and maintaining a secure network and system in the organization.
  • Help IT and security teams in implementing strong access control measures.
  • Helping Tier 1 SOC analysts in the process of upgrading to Tier 2 SOC analysts

Course Preparations:

  • A week before the beginning of the course, participants will be asked to join HackerU LMS, which will contain all course materials, labs and access to the live training.
    Participants will receive a link with a group code, and once approved by HackerU team, will be able to log in.
    At the day of training HackerU operations team will be available to assist in any login/technical problem.
  • It is participants’ responsibility to have a strong internet connection, headset & webcam.

Kurset henvender sig til

Target Audience Recommendations:
IT Professionals with at least 3 years of hands-on experience. SOC Analysts with at least 1 year and half of hands-on experience. Anyone who wish to defend the organization, with a hands-on experience of both Linux and Windows operation system.

Forudsætninger

This course is designed for people with an IT background skill and Experience with both Linux and Windows operation system.

Kursusindhold

Day 1: 2/12/2020


Module 01
- Virtualization

  • What is Virtualization
  • Hypervisors
  • Virtual Environment Setup
  • Virtualized Hardware
  • Virtualization Maintenance
  • Advanced Virtualization


Module 02
– Intro to Linux & Users and Permissions

  • Introduction to Linux
  • Distributions
  • File System
  • Users
  • Basic Commands
  • Editing Files
  • Linux Operators
  • Filtering Output
  • User & Group Management
  • Permissions
  • Su & Sudo
  • Monitoring Resources


Day 2: 7/12/2020


Module 03
– Linux Network Configuration & Package Management

  • Configure Network Settings
  • Network Troubleshooting
  • Debian Packages
  • Apt Packages
  • Package Management
  • Install Repository
  • Apache2
  • Telnet
  • SSH
  • FTP
  • SMB
  • SFTP


Day 3: 9/12/2020


Module 4:
Cyber Kill Chain

  • What is Information Security
  • Terminology
  • Types of Hackers
  • Hacker State of Mind
  • World of Security
  • Operation systems


Module 05
: Brute Force

  • Password Cracking
  • Passwords and hashes
  • Attack Vectors
  • Brute Force Tools
  • Dictionary Attack
  • Automation Tools


Day 4: 14/12/2020


Module 6
: DFIR Fundamentals

  • DFIR Fundamentals
  • Image Capture
  • Memory Capture
  • Forensics Tools
  • Forensic Methodologies


Day 5: 16/12/2020


Module 7
: SOC Life Cycle

  • SOC Fundamentals
  • SOC Team Responsibilities
  • Incident Prioritization
  • Vulnerability Assessment


Module 8
:  Utilizing SOAR in a SIEM Environment

  • SOAR
  • Automation Objectives
  • Successful Defense
  • Effective Usage
  • Demisto


Day 6: 21/12/2020


Module 9:
  Malware Analysis & Reverse Engineering – Static Analysis

  • Malware Analysis Introduction
  • Enumeration Techniques & Common Scanners
  • Portable Executable
  • Dynamic Link Library


Module 10:
Malware Analysis & Reverse Engineering – Dynamic Analysis

  • Dynamic Analysis Introduction
  • System Monitoring
  • Networking Monitoring
  • Malware Samples


Day 7: 6/01/2021

Module 11:
Reversing with IDA

  • Introduction to IDA
  • IDA Code Flow
  • Documentation Options
  • Patching with IDA


Day 8: 11/01/2021


Module 12
: PowerShell

  • PowerShell Fundamentals
  • PowerShell ISE
  • PowerShell Modules
  • PowerCat & Nishang
  • PowerShell to EXE


Day 9: 13/01/2021


Module 13
: Privilege Escalation

  • Windows Privileges
  • Domain Privileges
  • Windows Boot Process
  • Exploitation
  • Windows Defender ATP
  • Means of Protection


Day 10: 18/01/2021


Module 14
: Bypass SIEM Detection

  • Detection Fundamentals
  • Detection Bypass methodologies & Tools
  • External Bypass
  • Internal Bypass


Module 15
: Obfuscation

  • What is Obfuscation?
  • Types of Obfuscation
  • Packing
  • Various Tools
  • Tools Comparison
  • Multi-Layered Obfuscation


Day 11: 20/01/2021


Module 16:
Threat Hunting Vs Threat Intelligence

  • Threat Hunting
  • Threat Intelligence
  • Hunts and Cycles
  • Manual Threat Hunting
  • Threat Hunting Automation
  • Threat Hunting with Zeek


Module 17:
ELK

  • ELK Components
  • ELK installation & Configuration
  • ELK Functions
  • Threat Hunting with ELK


Day 12: 25/01/2021


Module 18:
Office Exploitation

  • VBA & Macro Injection
  • DDEAUTO Word Exploitation
  • CSV Injection
  • PowerPoint Exploitation
  • Social Engineering with SFX
  • Full Review over all the modules.

Kursusdato


Praktiske oplysninger
Pris:
kr. 33.750,- (ekskl. moms)
Kursusstart:
2 december 2020
Varighed:
12 dage (09.00 - 12.30)
Sted:
e-learning
Bemærk:
online course from 9:00 - 12:30


Er I flere fra samme virksomhed, som skal på kursus? Så kan der være penge at spare med et virksomhedskursus

Læs mere om virksomhedskurser her

Andre populære kurser


Aktuelt

Cyber Security - har din virksomhed styr på det? Måske ikke så meget som I burde?

Derfor kan vi nu præsentere:
Cyber Security for IT&SOC - et 12 dages online kursus
Kurset går i dybden med Cyber Security, så du og din virksomhed bliver klædt på til at forebygge de fejl, der kan ramme overskrifterne i aviserne.
Læs mere og tilmeld dig her

Robotic Process Automation (RPA) grundlæggende kursus
Bevæger man sig inden for digitaliseringsfeltet mellem IT og forretning er termer som softwarerobotter, Robotic Process Automation (RPA) og Robotic Desktop Automation (RDA) uundgåelige.
Læs mere og tilmeldt dig her

Robotic Process Automation (RPA) udvidet kursus
Deltag på dette kursus, hvor du bliver klædt på til at gå fra nysgerrighed eller eventuelt et par eksperimentelle enkeltstående robotter til en skalérbar løsning for dine softwarerobotter. Få konkrete værktøjer til at komme rigtigt i gang med RPA.
Læs mere og tilmeldt dig her

Kursuslokaler udlejes med og uden PC
Har du brug for et undervisningslokale med plads til op til 15 deltagere, så kan vi tilbyde fuldt udstyrede lokaler. Pris pr. dag 3.500.- kr. Forplejning 200.- kr. pr. person pr. dag.
Inkl. i prisen er teknisk support og service. Interesseret?
Kontakt os på telefon 77 300 123 og hør mere.


Hørkær 18
2730 Herlev
Tlf: 77 300 123
Email: idgkurser@idg.dk
CVR: 65970414