10151133Network Forensics and Threat Hunting
Course Information
Description
Hands-on first look at some of the tools, techniques, and procedures used for network-based and Windows forensics as it pertains to threat hunting. Attacks by basic to advanced threat actors will leave artifacts that can be detected. Study collecting and correlating current and historic pcap-based network data with host and network generated logs to create a profile of an attack for post-incident investigations and reporting or proactive threat hunting. Go further into forensics with examining end point data by investigating Windows and browser artefacts that track user actions. Open-source tools include: Security Onion [Hunt, Kibana, Playbook, Cyber Chef, Network Miner, Wireshark, etc.
Total Credits
3

Course Competencies
  1. Explain DD and Helix
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about tools used to mine data and the effectiveness of these tools
    you utilize the dd utility to access data off of a device
    you download a helix distribution and use it to access a system
    you create your own helix cd
    you listen attentively during class

  2. Compare grabbing and hashing
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about grabbing and hashing data
    you utilize forensic utility tools to access hidden or deleted data
    you listen attentively during class

  3. Use Forensic ToolKit (FTK) Imager
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about advanced tools that allow you to access data in FAT, NTFS, EXT 2 and 3 as well as HFS and HPFS file systems
    you utilize FTK to acquire locked system files
    you utilize FTK to hash physically or logically for verification
    you listen attentively during class

  4. Explain chain of custody
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about law and it's relationship with forensic data
    you enter into class discussions about preserving computer data as evidence
    you enter into class discussions about acting as an expert witness in a case on computer data
    you listen attentively during class

  5. Compare file headers and type mismatches
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about matching headers and file types
    you determine when data has mismatched headers and file types
    you listen attentively during class

  6. Utilize autopsy to mine data
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about open source digital investigation tools
    you utilize open source digital investigation tools to to analyze NTFS, FAT, Ext2, Ext3, UFS1, and UFS2 file systems and several volume system types
    you listen attentively during class

  7. Use PyFlag to mine data
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about log file analysis in forensic investigations
    you configure and utilize pyflag to analyze log files
    you listen attentively during class

  8. Explain data chunking
    Assessment Strategies
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    lab manual meets guidelines as specified by the instructor
    you enter into class discussions about managing large files of data
    you utilize data mining tools to access chunks of data on a RAID array
    you listen attentively during class