The Cyber Attack and Investigation Techniques – Introduction to the techniques of cyber attack investigation, and methods of attack analysis. This topic includes the following topics: Network Log Collection, Log Investigation and Analysis, and Techniques and Tools for Attack Investigation The Incident Response Process – Introduction to the cyber attack, the steps of an effective incident response process, and the recovery and remediation process. This topic includes the following topics: Preparation, Detection and Analysis, and Remediation. The Digital Evidence Acquisition – Overview of the acquisition techniques for digital forensic evidence collection which is mainly used for finding the source of attack. This topic includes the following topics: Forensic Imaging, and Live Response Acquisition. Introduction to Windows Evidence – Basic concept of the key sources of evidence that can be used to investigate a compromised Windows system. This module focuses on the following artifacts: Network Connections and Browser History, File System Analysis, Windows Registry, Event Logs, and Live Memory Forensics etc. Introduction to Cyber attack using malware – Overview of the primary types of malware, how to create a safe malware analysis environment, the malware analysis and reporting process, static and dynamic analysis, tools used to detect, identify, and analyze malware. Demonstration and Hand-on Exercises for Attack and Malware Detection and Analysis – This section demonstrate how malware works, how to detect the malicious processes and connections. The attendances receive hand-on exercises in order to practice and improve some technical skill for analyzing and responding to incidents. Detecting and Analyzing Malware in Memory – Introduction to the architecture of Windows operating system, the architecture of Random Access Memory (RAM), pagefile, and virtual memory. The techniques to identify and trace malware artifact running in memory such as processes, handles, and memory sections. This topic introduces standard techniques and favorite tools used for detecting and analyzing malware running in memory. Advanced Persistent Threat (APT) – Introduction to the nature of cyber attack named Advanced Persistent Threat (APT). In-depth review of malware analysis used by APT in order to monitor, create a covert channel, and communicate back to command & control center (C&C). The process of forensic investigation to examine network log, Windows registry, shellbags, LNK files, and MRU keys Cases Study and Hand-on Exercises for APT – Instructor provides an in-depth review of an actual intrusion case that involved the use of multiple pieces of malware. This section also demonstrates how APT and malware works, as well as how to identify the malicious processes and connections. The attendances receive hand-on exercises in order to practice and improve some technical skill for analyzing and responding to incidents.
EREQUISITES General knowledge of computer and operating system. Some experience in computer programming languages. Background in Computer Network and Tools such as Wireshark. Some basic of Linux command.