Day 1
- MITRE ATT&CK framework
- Defensive OSINT
- Linux auditing and logging
- Windows auditing, events, logging and Sysmon
- Using Logstash as a data forwarder
- Overview of KQL and Microsoft Sentinel
- Identifying Indicators of Attack (IOA) and Indicators of Compromise (IOC)
- Detecting phishing attacks (Office macros, HTA’s and suspicious links)
- Detecting C2 traffic and beacons
- Detecting credential exploitation Part 1 (Kerberoasting, PtH)
Day 2
- Detecting credential exploitation Part 2 (PtT, DCSync)
- Creating alerts and analytical rules in Microsoft Sentinel
- Detecting lateral movement within a network (WinRM, WMI, SMB, DCOM, MSSQL)
- Detecting data exfiltration (HTTP/S, DNS, ICMP)
- Detecting persistence activities (userland methods, WMI Event Subscriptions)
- C2 Communications
Extras:
After training, students will be provided with:
14-day extended LAB access after the course finishes
Discord support channel access
About the courses authors and trainers
Twitter & Bios:
Will (@Stealthsploit) co-founded In.security in 2018. Will's been in infosec for over a decade and has helped secure many organisations through technical security services and training. Will's delivered hacking courses globally at several conferences including Black Hat and has spoken at various conferences and events. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.
Owen (@rebootuser) is a co-founder of In.security, a specialist cyber security consultancy offering technical and training services based in the UK. He has a strong background in networking and IT infrastructure, with well over a decade of experience in technical security roles. Owen has provided technical training to a variety of audiences at bespoke events as well as Black Hat, Wild West Hackin' Fest, NolaCon, 44CON, TROOPERS, BruCON and Hack in Paris. He keeps projects at https://github.com/rebootuser.