You Will Be Able To • Understand when incident response requires in-depth host interrogation or light-weight mass collection • Deploy collaboration and analysis platforms that allow teams to work across rooms, states, or countries simultaneously • Collect host- and cloud-based forensic data from large environments • Discuss best practices for responding to Azure, M365, and AWS cloud platforms • Learn analysis techniques for responding to Linux and Mac operating systems • Analyze containerized microservices such as Docker containers • Correlate and analyze data across multiple data types and machines using a myriad of analysis techniques • Conduct analysis of structured and unstructured data to identify attacker behavior • Enrich collected data to identify additional indicators of compromise • Develop IOC signatures and analytics to expand searching capabilities and enable rapid detection of similar incidents in the future • Track incidents and indicators from beginning to end using built- for-purpose incident response engagement tooling Who Should Attend This course is aimed at digital forensics, incident response, intrusion detection, and threat hunting professionals in medium to large organizations, who constantly face battles with enterprise scale and complexity. Please note that FOR608 is an advanced course that skips over introductory material of Windows host- and network-based forensics and incident response. Although this class is not necessarily more technical than our 500-level classes, it does assume that prior knowledge so that topics and concepts are not repeated. NICE Framework Work Roles • Cyber Defense Incident Responder (OPM 531) • Cyber Crime Investigator (OPM 221) • Law Enforcement /CounterIntelligence Forensics Analyst (OPM 211) • Cyber Defense Forensics Analyst (OPM 212) Prerequisites FOR608 is an advanced level course that skips over introductory material of Windows host- and network-based forensics and incident response. This class is not necessarily more technical than our 500-level classes, but it does assume that knowledge so that topics and concepts are not repeated. Students must have multiple years of DFIR experience and/or have taken classes such as: • FOR500: Windows Forensics Analysis, and/or • FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting FOR608: Enterprise-Class Incident Response and Threat Hunting Enterprises today have thousands, maybe even hundreds of thousands – of systems ranging from desktops to servers, from on-site to the cloud. Although geographic location and network size have not deterred attackers in breaching their victims, these factors present unique challenges in how organizations can successfully detect and respond to security incidents. Our experience has shown that when sizeable organizations suffer a breach, the attackers seldom compromise one or two systems. Without the proper tools and methodologies, security teams will always find themselves playing catch-up, and the attacker will continue to achieve success. FOR608: Enterprise-Class Incident Response and Threat Hunting focuses on identifying and responding to incidents too large to focus on individual machines. The concepts are similar: gathering, analyzing, and making decisions based on information from hundreds of machines. This requires the ability to automate and the ability to quickly focus on the right information for analysis. By using example tools built to operate at enterprise-class scale, students will learn the techniques to collect focused data for incident response and threat hunting. Students will then dig into analysis methodologies, learning multiple approaches to understand attacker movement and activity across hosts of varying functions and operating systems by using timeline, graphing, structured, and unstructured analysis techniques. Business Takeaways • Reduce financial and reputational impact of a breach by more efficiently and precisely managing the response • Learn IR management techniques that optimize resource usage during an investigation • Deploy collaboration and analysis platforms that allow teams to work across rooms, states, or countries simultaneously • Understand and hunt for techniques attackers use to hide from EDR and application control tools on Windows systems • Learn analysis techniques for responding to compromised Linux and macOS systems • Be able to respond and analyze containerized microservices such as Docker containers • Discuss best practices for responding to the most popular cloud environments—specifically Microsoft365/AzureAD, and AWS 6 Day Program 36 CPEs Laptop Required “ The course content covers a lot of important topics focused on detection and response. I enjoyed the sections on Threat Driven Intelligence and TimeSketch for creating incident timelines.” —Reggie M., Amazon sans.org/for608 • Watch a preview of this course • Discover how to take this course: Online, In-Person