10151137Incident Response
Course Information
Description
Provides an overview of the tools and techniques commonly used for detecting threats to an enterprise infrastructure. Implement strategies for documenting and reporting detected events based on industry standard compliance frameworks. We will use the Security Onion distribution. Tools include Elasticsearch, Logstash, Kibana (ELK), Wazuh, Suricata, Zeek, Wireshark, and TCP Dump.
Total Credits
3
Course Competencies
-
Analyze how different fields are applied in various network flows/sessionsAssessment StrategiesLab assignment, skill demonstrationCriteriaFilter/Analyze traffic using Berkeley Packet Filters in tcpdumpFilter/Analyze traffic using Wireshark Display FiltersReconstruct/Analyze data flows using Wireshark
-
Investigate interesting traffic to identify possible anomaliesAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze basic protocols to define normal from abnormal behaviorAnalyze abnormalities that common exploits display and explain how they differ from normal trafficAnalyze complex protocol interactions and demonstrate how these can be used to identify an attack
-
Develop custom rules and filters to match different patterns of potential malicious trafficAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze current network traffic and construct basic Suricata signaturesAnalyze current network traffic and construct basic Bro/Zeek scriptsAnalyze current network traffic and construct basic ElasticAlerts
-
Correlate suspicious network events to matching system log activityAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze the relationship between network anomalies and a resulting log entry using Kibana/OSSEC/WazuhDifferentiate a malicious from a benign network anomaly
-
Correlate current traffic flow and log patterns against historical baselinesAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze how basic normal user interactions with a system are reflected in logs using Wazuh/OSSECEvaluate and contrast abnormal interactions with normal within system logs using Wazuh/OSSEC
-
Produce security incident documentationAssessment StrategiesLab assignment, skill demonstrationCriteriaBasic report describes an incident based on information obtained using Kibana and other related toolsIncident report should contain, Incident overview, Incident details, Incident Timeline, and any recommended Remediation Action
-
Apply threat hunting tools and techniques to basic business processes and topologiesAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze concentration points to determine best location to collect network packet and flow data using Security OnionConfigure syslog forwarding from network devices to aggregate logs using Wazuh, OSSEC and logstash
-
Analyze the impact of industry compliance frameworks within a given business environmentAssessment StrategiesLab assignment, skill demonstrationCriteriaAnalyze how Incident Response tools and techniques relate to compliance and regulatory frameworksUse event and log monitoring in Kibana to provide confirmation of adhering to a framework using the Cyber Security Maturity Model (CMMC) framework as a reference