Docs Wikilivre.
  • Accueil
  • Attestations
  • Cours & Exercices
  • Documents
  • Entreprise
  • Formation
  • Lecteur PDF
No Result
View All Result
No Result
View All Result
Docs Wikilivre.
  • Accueil
  • Attestations
  • Cours & Exercices
  • Documents
  • Entreprise
  • Formation
  • Lecteur PDF
No Result
View All Result
Docs Wikilivre.
No Result
View All Result

Kaspersky Cybersecurity Training

Loader Loading...
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

 

401
SHARES
6.7k
VIEWS
Share on FacebookShare on Twitter
  • Titre : Kaspersky_Security_Training.pdf
  • Submitted by : Anonymous
  • Description : 1 Kaspersky Cybersecurity Training Cybersecurity education is the critical tool for enterprises faced with an increasing volume of constantly evolving threats.

Transcription

 

Kaspersky
Cybersecurity
Training

Kaspersky Cybersecurity Training

Cybersecurity education is the critical tool for enterprises faced with an increasing volume of constantly
evolving threats. IT Security staff need to be skilled in the advanced techniques that form a key component
of effective enterprise threat management and mitigation strategies.

These courses offer a broad curriculum in cybersecurity topics and techniques and assessment ranging from
basic to expert. All are available either in-class on customer premises or at a local or regional Kaspersky
office, if applicable.

Courses are designed to include both theoretical classes and hands-on ‘labs’. On completion of each course,
attendees will be invited to complete an evaluation to validate their knowledge.

Kaspersky
Cybersecurity Services

Service Benefits

Kaspersky
Threat Intelligence

Kaspersky
Threat Hunting

Kaspersky
Cybersecurity Training

Windows Digital Forensics
Malware Analysis and Reverse
Engineering
Advanced Windows Digital
Forensics
Advanced Malware Analysis
and Reverse Engineering
Windows Incident Response
Efficient Threat Detection
with Yara

Kaspersky
Security Assessment

Windows Digital Forensics and Advanced Windows
Digital Forensics
Improve the expertise of your in-house digital forensics and incident response team.
Courses are designed to fill experience gaps – developing and enhancing practical skills
in searching for digital cybercrime tracks and in analyzing different types of data for
restoring attack timelines and sources. Having completed the course, students will be
able to successfully investigate computer incidents and improve the security level of
the business.

Malware Analysis and Reverse Engineering
and Advanced Malware Analysis and Reverse
Engineering

These courses are intended for security researchers and incident response personnel,
malware analysts, security engineers, network security analysts, APT hunters and IT security
staff. Students will become familiar with the scope of reverse engineering applications,
assembly language, corresponding tools, common techniques used by malware authors
to maintain persistence, avoid detection, inject into system processes memory etc.
The advanced course will cover most of the steps required to analyze a modern APT
toolkit, from receiving the initial sample, all the way to producing a deep technical
description with IOCs.

Course will guide your in-house team through all of the stages of the incident response
process and equip them with the comprehensive knowledge needed for successful
incident remediation.

Efficient Threat Detection with Yara

Will help to learn how to write the most effective Yara rules, how to test them and improve
them to the point where they find threats that nothing else does.

Hands-On Experience

From a leading security vendor, working and learning alongside our global experts who
inspire participants through their own experience at the ‘sharp end’ of cybercrime
detection and prevention.

Kaspersky
Incident Response

Windows Incident Response

1

Program Description

Topics

Windows Digital Forensics

Introducing digital forensics

Through a real-life simulated cyber targeted attack incident, the course will cover
the following topics:
•
• Live response and evidence acquisition
• Post-mortem analysis of Windows machines
• Windows OS registry internals
• Windows OS events
• Windows OS artifacts analysis
• Browsers artifacts forensics
• Email analysis
• Forensics challenges with SSD disks
• Recommendations when building a digital forensics lab
• Testing the newly gained skills with a practical challenge using different Windows artifacts

Malware Analysis & Reverse Engineering

• Basic analysis using IDA Pro
• Dynamic analysis using popular virtualization solutions and debuggers
• Malicious documents analysis
• Unpacking
• Decryption
• Shellcodes analysis
• Exploit analysis
• Reversing tips and tricks

Advanced Windows Digital Forensics

Through a real-life simulated cyber targeted attack incident, the course will cover
the following topics:
• Numerical systems
• FAT file system
• NTFS file system
• Deep Windows forensics
• Data and file recovery from file system, shadow copies and using file carving
• Forensics challenges in Cloud computing
• Memory forensics
• Network forensics
• Timeline vs SuperTimeline analysis
• Testing the newly gained skills with a practical challenge with acquired digital evidence

Advanced Malware Analyisis & Reverse Engineering

• Unpacking
• Decryption
• Developing own decryptors for common scenarios
• Byte code decompilation
• Code decomposition
• Disassembly
• Reconstruction of modern APT architectures
• Recognizing typical code constructs
•
• Classification and attribution based on code and data
• Class and structure reconstruction
• APT plugin architectures (based on recent APT samples)

Identification of cryptographic and compression algorithms

Windows Incident Response

Duration Skills gained

5 days

• Acquiring various digital evidence and dealing with it in

forensically sound environment

• Find traces of incident-related malicious activities from

the Windows OS artifacts

• Utilizing time stamps from different Windows artifacts

to reconstruct an incident scenario

• Finding and analyzing browser and email history
• Be able be apply the tools and instruments of digital

forensics

• Understating the process of creating a digital forensics lab

5 days

5 days

5 days

• Get preliminary knowledge about OS and assembly language
• Conduct static and dynamic malware analysis obtaining

full understanding of its behavior and functionality
• Deal with malware anti-analysis tricks, self-protective

•

techniques and protection software bypasses
Identify and reverse engineer standalone and embedded
shellcodes

• Be able to analyze PDF exploits from scratch

• Conducting deep file system analysis
•

Identifying and recovering deleted files using different
techniques

• Analyzing network traffic with different tools
•
•

Identifying and tracking malicious activities in memory dump
Identifying and dumping interesting parts from memory
for further analysis

• Reconstructing the incident timeline using file system

timestamps

• Creating one timeline for all Windows OS artifacts
for a better understating of the incident scenario

• Be able to analyze a modern APT toolkit, from receiving
the initial sample, all the way to producing a technical
description of the attacker’s TTPs with IOCs

• Producing static decryptors for real-life scenarios and then
continuing with in-depth analysis of the malicious code
• Be able to analyze malicious documents that are typically

used to deliver initial payloads and know how to extract them

• Ensuring damage assessment and incident response

efforts are accurate and effective

5 days

•

In a real-life simulated environment, an incident will take place and the course will
cover the following topics on that scenario:
•
Introducing the incident response process and its workflow
• Explaining the difference between normal threats and APTs
• Explaining APT Cyber Kill Chain
• Applying the incident response process to different incident scenarios
• Applying Cyber Kill Chain on the simulated environment
• Applying live analysis on victim machines for first responders
• Forensically sound evidence-acquisition techniques
•
•
• Log file analysis with regular expressions and ELK
•
• Creating IoCs (Indicators of Compromise), with YARA and SNORT
•
•
• Discussing incident analysis reporting and recommendations on building CSIRT
• Testing the newly gained skills with a practical challenge in another simulated scenario

Introducing post-mortem analysis and digital forensics
Introducing memory forensics

Introducing malware analysis and sandboxing
Introducing network traffic forensics

Introducing cyber threat intelligence

• Understanding the phases of incident response
• What to consider while responding to a cyber incident
• Understanding various attack techniques and targeted

attack anatomy through the Cyber Kill Chain

• Responding to different incidents with appropriate actions
• The ability to differentiate APTs from other threats
• Confirming cyber incidents using live analysis tools
• Understanding the difference between live analysis and

•

post-mortem – and when to apply each of them
Identifying digital evidence; HDD, memory and network
traffic with an introduction on their forensics analysis
• Writing YARA and SNORT IOCs for the detected attack
• Log file analysis
• Understanding the process involved in building an IR team

Efficient Threat Detection with Yara

• Brief intro into Yara syntax
• Tips & tricks to create fast and effective rules
• Yara-generators
• Testing Yara rules for false positives
• Hunting new undetected samples on VT
• Using external modules within Yara for effective hunting
• Anomaly search
• Lots (!) of real-life examples
• A set of exercises for improving your Yara skills

2 days

• Create effective Yara rules
• Test Yara rules
•

Improve them to the point where they find threats
that nobody else does

2

Cyber Threats News: www.securelist.com
IT Security News: business.kaspersky.com
IT Security for SMB: kaspersky.com/business
IT Security for Enterprise: kaspersky.com/enterprise

www.kaspersky.com

2019 AO Kaspersky Lab. All rights reserved.
Registered trademarks and service marks are the property
of their respective owners.

We are proven. We are independent. We are
transparent. We are committed to building a safer
world, where technology improves our lives. Which
is why we secure it, so everyone everywhere has the
endless opportunities it brings. Bring on cybersecurity
for a safer tomorrow.

Know more at kaspersky.com/transparency

Share160Tweet100Share28Send

Related Posts

e.learning) dans la formation professionnelle des salariés

Non correcte CMYK RVB – Formation Emitech

associations agrées formations secours

LICENCE EN NUTRITION ET DIETETIQUE

Next Post

FORMATION EMPLOYÉE DE MÉNAGE REPASSAGE

Formation Electricité : www.entraide.asteolelec.fr 1

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending Categories

Attestation Cours & Exercices Documents Entreprise Formation
No Result
View All Result

Latest documents

  • Cours Sur Les Alcools En Terminale S Pdf
  • Cours Instrumentation Industrielle Pdf
  • Cours Administration Systeme Linux Pdf
  • Cours D Audit Comptable Et Financier Ohada Pdf
  • Chimie Quantique Cours Pdf

Recent Comments

  • juliaa on FORMATION Maquillage permanent
  • SAYYED AHMAD NAFIZ on How to Create a New Microsoft Outlook/Hotmail/Live email …

Archives

  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • September 2021
  • August 2021
  • July 2021

Categories

  • Attestation
  • Cours & Exercices
  • Documents
  • Entreprise
  • Formation

Docs Wikilivre

Docs Wikilivres est site d'informations gratuit permettant de partager et lire les documents, guides pratiques et informations utiles.

  • Docs
  • Contact

© 2021 Wikilivre - Free learning for everyone.

No Result
View All Result
  • Accueil
  • Attestations
  • Cours & Exercices
  • Documents
  • Entreprise
  • Formation
  • Lecteur PDF