Mandiant Academy – Windows Enterprise Incident Response


Mandiant Academy – Windows Enterprise Incident Response
English | Size: 2.5 GB
Genre: eLearning

This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms and investigate an incident throughout an enterprise. Although the course is focused on analyzing Windows-based systems and servers, the techniques and investigative processes are applicable to all systems and applications. The course includes detailed discussions of common forms of endpoint, network and file-based forensic evidence collection and their limitations as well as how attackers move around in a compromised Windows environment. The course also explores information management that enriches the investigative process and bolsters an enterprise security program. Discussion topics include the containment and remediation of a security incident, and the connection of short-term actions to longer-term strategies that improve organizational resiliency.

Syllabus
Describe the incident response process, including the threat landscape, targeted attack life cycle, initial attack vectors used by different threat actors, and phases of an effective incident response process
Conduct triage system to answer key questions about what transpired across the enterprise during an incident
Apply lessons learned to proactively investigate an entire environment (including metadata, registry, event logs, services, persistence mechanisms and artifacts of execution) at scale for signs of compromise
Manage and effectively record information related to ongoing investigations and incidents
Understand the role of the remediation phase in an enterprise investigation
Understand how to hunt for threats using threat intelligence, anomaly detection and known threat actor techniques, tactics and procedures (TTPs)

DOWNLOAD FROM RAPIDGATOR

rapidgator.net/file/0d681d4c16167b2505c47370affef3ec/WindowsEnterpriseIncidentResponse.part1.rar.html
rapidgator.net/file/4d89eb70e99384a34cb791d567704a09/WindowsEnterpriseIncidentResponse.part2.rar.html
rapidgator.net/file/3a09508bce8f7821424709ff4491a5dc/WindowsEnterpriseIncidentResponse.part3.rar.html
rapidgator.net/file/d77119ec5b3dae2ef2c55e33fa25daf2/WindowsEnterpriseIncidentResponse.part4.rar.html
rapidgator.net/file/a56bab57f32926d729597de903f3636f/WindowsEnterpriseIncidentResponse.part5.rar.html
rapidgator.net/file/b03d70903d8c4f7365388d18b6c83e5d/WindowsEnterpriseIncidentResponse.part6.rar.html
rapidgator.net/file/a6a7c7ac85a0d25c1d38084e4f5ebd0e/WindowsEnterpriseIncidentResponse.part7.rar.html

DOWNLOAD FROM TURBOBIT

tbit.to/hyszdah7mqck/WindowsEnterpriseIncidentResponse.part1.rar.html
tbit.to/o3hngjynz5k7/WindowsEnterpriseIncidentResponse.part2.rar.html
tbit.to/gbtpw195fkr9/WindowsEnterpriseIncidentResponse.part3.rar.html
tbit.to/m1dc5llj4i86/WindowsEnterpriseIncidentResponse.part4.rar.html
tbit.to/6eemj3v1r6d0/WindowsEnterpriseIncidentResponse.part5.rar.html
tbit.to/4lwked3zqq0m/WindowsEnterpriseIncidentResponse.part6.rar.html
tbit.to/a3lnquwbpkat/WindowsEnterpriseIncidentResponse.part7.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.