Back

Enterprise Incident Responder

This course is designed to equip participants with the knowledge and skills needed to effectively detect, respond to, and recover from cybersecurity incidents in an enterprise environment

Tarek

Lead Trainer

Description
Coming soon

Course Curriculum

Introduction to Enterprise Incident Response

4 lessons

1. The importance of incident response in an enterprise

2. Key components of incident response program

3. Preparation, Detection, Analysis and Remediation

4. Overview of incident response frameworks

Building and Incident Response Plan

5 lessons

5. Components of an Incident Response Plan

6. Defining roles and responsibilities

7. Establishing communication channels and protocols

8. Creating and testing playbooks

9. Testing and updating the incident response plan

Threat Intelligence and Incident Detection

3 lessons

10. Introduction to threat intelligence

11. How and when to use threat intelligence

12. Source of threat intelligence

Introduction to Windows Evidence

7 lessons

13. Network connections

14. Browser history

15. Windows prefetch

16. File system analysis

17. Windows registry

18. Event logs

19. Memory analysis

Invetigating Persistence

3 lessons

20. Understanding the attack lifecycle

21. Common persistence mechanisms

22. Investigating remote access techniques

Investigting Lateral Movement

4 lessons

23. Understanding Windows Credentials

24. Understanding Windows Credentials

25. Analyzing Logon Events

26. Investigating remote command execution

Investigting Web Attacks

2 lessons

27. Introduction to Web Logs

28. Investigating common web attacks

Post-Incident Activities and Lessons Learned

4 lessons

29. Conducting a post-incident review

30. Identifying gaps and areas for improvement

31. Updating incident response plans and playbooks

32. Continuous improvement and training