SIT Overview

In 2018 there were over 6,500 cyber incidents that resulted in the compromise of over 5 billion sensitive records, with the average cost of a single data breach at $3.9 million.

Malicious attacks were the root cause of almost 50% of these data breaches. Rather than focusing on “toolset mastery”, Obscurity Labs’ Security Operations Center (SOC) Immersion Training (SIT) aims to disrupt breach statistics by educating SOC analysts in critical analyst concepts and methodologies necessary to detect and respond to current real-world advanced persistent threat (APT) Tactics Techniques and Procedures (TTP) and Tradecraft Core Concepts (TCC). Instead of the traditional “lecture, followed by static lab” concept; SIT utilizes a unique training model with hands-on, live attack scenarios, performed by experienced Red Team Operators, to reinforce the SOC analyst’s understanding of lecture materials.

SIT Core Concepts

  • Executing a Layered Analysis Methodology

    When analyzing an alert, it is important to follow a methodology that encourages analytical thought. This enables the SOC analyst to draw conclusions that transcends alerts generated by tools.

  • Creating Indicators of Compromise (IOC)

    Understanding the difference between hard and soft IOC allows an analyst to make tactical assumptions. This enables the SOC analyst to reduce the “mean time to react” and improves their overall ability to detect and respond to malicious activity.

  • Identifying Artifact and Evidence Locations

    SOC analysts must use multiple data sources to create high fidelity alerts, correlate events, and focus their analysis. This enables SOC analysts to improve processes, reduce triage timing, and identify detection gaps.

Course Curriculum

    1. Welcome & Team Introductions

    2. Tactics Tools & Techniques

    3. Layered Analysis Methodology

    1. Initial Access Overview

    2. HTML Application (HTA)

    3. Microsoft Office Macros

    4. Microsoft Silverlight

    1. Persistence Overview

    2. Registry Modification

    3. Service Abuse

    4. Windows Management Interface (WMI) Subscriptions

    1. Privilege Escalation Overview

    2. PowerUP

    3. User Account Control (UAC) Bypass

    4. Remote Privilege Escalation

    1. Lateral Movement & Objective Achievement Overview

    2. PsExec / Powershell

    3. WMI Process Creation

    4. WMI Subscription

    1. Congrats! Here's what's next...

    2. More resources for you

    3. Before you go...

About this course

  • Free
  • 22 lessons
  • 0 hours of video content

Countdown Until The Next SIT!

The next SIT will be held on (TBD).

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds