Advanced Topics in Incident Handling

This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.

Building on the methods and tools discussed in the Fundamentals of Incident Handling course, this course provides guidance that incident handlers can use in responding to complex threats and attacks, including persistent threats. Through interactive instruction, facilitated discussions, and group exercises, instructors help participants identify and analyze a set of events and then propose appropriate response strategies.

Participants work as a team throughout the week to handle a series of escalating incidents that are presented as part of an ongoing scenario. Work includes team analysis of information and presentation of findings and response strategies. Participants also review more advanced types of activities related to incident handling such as threat hunting; artifact and malware analysis; vulnerability handling; and publishing and communicating information.

This CERT incident handling course, which adds additional expertise for understanding incident handling and related practices and functions, can be used to prepare for the CERT-Certified Incident Handler Certification. Before registering for this course, participants are encouraged to attend the companion course, Fundamentals of Incident Handling.


WHO SHOULD ATTEND?

Current computer security incident response team (CSIRT) and security operations center (SOC) technical staff with six or more months incident handling experience

TOPICS

  • Incident handling life-cycle review
  • Data loss prevention techniques
  • Advanced persistent threats
  • Artifact and malware analysis categories and techniques overview
  • Fundamental causes of vulnerabilities
  • Vulnerability handling overview
  • Analyzing and coordinating response to major computer security events and incidents
  • Developing and delivering effective communications

OBJECTIVES

This course will help participants to

  • Handle a series of escalating incidents that are presented as part of an ongoing scenario
  • Detect and characterize various attack types
  • Develop a strategy for analyzing and responding to complex or major events and incidents within your organization
  • Comprehend various methods for analyzing artifacts left on a compromised system and issues involved with such analysis
  • Develop and execute cyber threat hunting goals
  • Obtain practical experience in the coordination of vulnerability handling tasks
  • Formulate and deliver effective publications and communications such as advisories, alerts,after-action reports and management briefings

PREREQUISITES

Before registering for this course, it is recommended that participants attend the Fundamentals of Incident Handling course. It is also recommended that participants have the following:

  • At least six months or more of incident handling experience
  • An understanding of internet services and protocols
  • Experience with windows and unix systems
  • Experience with various types of computer security attacks,response strategies, incident handling tools
  • It is recommended but not required that participants also have experience programming in C, Perl, Java, or similar languages.