| Overview 
				
				This class will provide the students with a unique perspective on network intrusion investigations and analysis. Students will begin the course by compromising a system ("ethical hacking") leveraging techniques that have been seen in the wild by attackers. Once in, they will walk through the stages of an intrusion, from compromise to entrenchment, and exfiltration of data. The course then takes a unique spin in that students will review the captured network traffic looking for artifacts of their compromise, combing through packet captures to see the footprint that they, as the attacker, have left. Not stopping there, students will then learn the principles of an incident response, leveraging the tools of the trade to collect volatile data as well as forensic imaging of a compromised host. Finally, class attendees with complete the course by performing forensic analysis of the acquired artifacts, rounding out the lifecycle of an intrusion investigation.
 Audience
 
				
				This course will significantly benefit security professionals, network administrators, systems administrators, auditors, cyber investigators and anyone who is concerned about the integrity and security of their systems and network infrastructure. This course will also be extremely beneficial to anyone with a firm technical background who might be asked to investigate a data breach incident, intrusion case.
	
 Prerequisites
 Course durationRequired - Familiarity with the core TCP/IP protocols (e.g., FTP, TCP, HTTP)
				Required - Windows and Linux command-line interfaces
Recommended ¡V Ethical Hacking
 
 5 days
 
 Course Objectives
 
 Upon successfully completing the course, students will be able to:
 Course outlineScan and exploit a remote target
				Identify network traffic and log entries related to scanning and exploitation
				Use automated tools to perform exploitation
				Perform a Vulnerability Analysis
				Analyze a Network Intrusion
Utilize hacker Methodologies and Anti-Forensic techniques
		
 
 Day 1 Windows network intrusions overview Outline
 Overview of Windows networking
  Variety of operating systems
  Servers, (Windows, Linux, email, web, file, print)
  Network devices and their logs
  What devices are in the path from infection to Internet
  So called witness devices
  What can you see on your network?
  Where are the holes in your visibility?
  Current security posture of most organizations
 Open source vs commercial
 Open source vs commercial
 Attackers, their objectives and their tools
  What are they after and why
  Where to look for signatures
  Tipping off the attackers
  Communication channels (out of band)
 Day 2 Attacker tools, methods and tacticsFrequent locations and data sets.
  Frequency of malware with intrusions
 What do they look for and why?
 Day 3 Incident Response How and why do they entrench
  Notification of an incident
  How do incidents get reported?
  OS types within your network
  Non-Volatile data collection
  What can the CIRT team do?
 Day 4 Media Analysis (forensics) How to elevate permissions
  Windows Registry Analysis
  Unallocated Space/Data Carving
 Day 5 Putting it all Compromised account tracking
   Series of hands on exercises
 
 
 |