Course Curriculum

  • 1

    SIT Downloads

    • OpenVPN - Installer & config

  • 2

    Cheatsheets

    • SIT Cheatsheets

    • OSQUERY - Threat Hunting

  • 3

    (SIT-BC-I) Introduction & Familiarization

    • Course Introduction

    • Basic Attack Methodology

    • Tactics Tools and Techniques

    • Layered Analysis Methodology Part 1

    • Layered Analysis Methodology Part 2

    • SOC Operating Principles

    • Understanding the Environment

    • Primary Data Points

    • Soft vs. Hard Indicators of Compromise

    • Understanding Environment Capabilities Part 1

    • Understanding Environment Capabilities Part 2

    • Understanding Environment Capabilities Part 3

    • Understanding Environment Capabilities Part 4

    • Understanding Environment Capabilities Part 5

    • ELK & Bro Intermediate Lab

  • 4

    (SIT-BC-I) Initial Access

    • Initial Access Introduction

    • Post Access Actions

    • Microsoft HTML Application (HTA)

    • Microsoft Office Abuse - Macros and Visual Basic for Applications (VBA)

  • 5

    EndGame

    • Questions

  • 6

    End of Course Survey

    • End of Course Survey Link