Course Curriculum

  1. 1
    • OpenVPN - Installer & config

  2. 2
    • SIT Cheatsheets

    • OSQUERY - Threat Hunting

  3. 3
    • Course Introduction

    • Basic Attack Methodology

    • Tactics Tools and Techniques

    • Layered Analysis Methodology Part 1

    • Layered Analysis Methodology Part 2

    • SOC Operating Principles

    • Understanding the Environment

    • Primary Data Points

    • Soft vs. Hard Indicators of Compromise

    • Understanding Environment Capabilities Part 1

    • Understanding Environment Capabilities Part 2

    • Understanding Environment Capabilities Part 3

    • Understanding Environment Capabilities Part 4

    • Understanding Environment Capabilities Part 5

    • ELK & Bro Intermediate Lab

  4. 4
    • Initial Access Introduction

    • Post Access Actions

    • Microsoft HTML Application (HTA)

    • Microsoft Office Abuse - Macros and Visual Basic for Applications (VBA)

  5. 5
    • Questions

  6. 6
    • End of Course Survey Link