On This Page

Windows Enterprise Incident Response: Black Hat Edition

FireEye | March 20 - 21



Overview

Course Description

The course is comprised of the following modules, with labs included throughout the instruction:

  • The Incident Response Process – An introduction to the threat landscape, targeted attack life-cycle, initial attack vectors used by different threat actors, and the phases of an effective incident response process.
  • Single System Analysis – This module includes in-depth information about the most common forms of endpoint forensic evidence collection and the benefits and limitations of each. A deep dive will be taken into file system metadata, registry, event logs, services, common persistence mechanisms, and artifacts of execution. Students will be taught to answer the key questions about what transpired.
  • File System Metadata
  • Event Logs
  • Registry
  • Memory Analysis
  • Enterprise Investigations – How to apply the lessons-learned from the previous modules to proactively investigate an entire environment, at-scale, for signs of compromise. An in-depth analysis of how attackers move from system-to-system in a compromised Windows environment, the distinctions between network logons and interactive access, and the resulting sources of evidence on disk, in logs, and in the registry.
  • Investigation Management – Managing and effectively recording information related to ongoing investigations and incidents is crucial for success. This module will cover the best practices and some approaches to information management which enrich the investigative process and bolster the enterprise security program.
  • Remediation – The remediation phase of an enterprise investigation is an important part of the incident response process. Discussion on the containment and remediation of a security incident will bridge short-term immediate actions taken during a live incident, to longer term strategic posturing to improve the resiliency of the organization as a whole.
  • Threat Hunting – Threat hunting is a critical component of an effective enterprise security program. Hunting using threat intelligence, anomaly detection and known threat actor techniques, tactics and procedures (TTPs). Applying the lessons-learned from the previous modules to proactively investigate an entire environment, at-scale, for signs of compromise.

Who Should Take this Course

This is a fast-paced technical course that is designed to provide hands-on experience with investigating targeted attacks and the analysis steps required to triage compromised systems. The content and pace is intended for students with some background in conducting security operations, incident response, forensic analysis, network traffic analysis, log analysis, security assessments & penetration testing, or even security architecture and system administration duties. It is also well suited for those managing CIRT / incident response teams, or in roles that require oversight of forensic analysis and other investigative tasks.

Student Requirements

Students must have:
a working understanding of the Windows operating system, file system, registry, and use of the command-line.
familiarity with Active Directory, basic Windows security controls, and common network protocols.

What Students Should Bring

  • Students must possess Administrator rights to the system they will use during class and must be able to install software provided on a USB drive.
  • Students must bring a laptop that meets the following minimum requirements:
  • Operating System: Windows 7 or newer
  • Processor: Core i5 or equivalent
  • RAM: At least 6GB, preferably 8GB
  • HDD: At least 25GB free space
  • Virtual machines are acceptable provided at least 4GB of RAM can be allocated. Students are responsible for providing their own copies of and licenses for Windows.

What Students Will Be Provided With

  • a participant guide
  • a USB drive containing all required lab materials and tools
  • Mandiant-branded gear

Trainers

Instructors will be determined and bios will be provided as we near the event. They will be from the pool of seasoned instructors we use year after year.