Cybersecurity attacks have become a regular occurrence that is nearly impossible to avoid. In particular, corporations must be able to swiftly respond and recover to attacks, while maintaining proper operations limiting the scope of damage.
CYBERSEC 2020 CyberLAB gathers leading cybersecurity experts to serve as guides who take you step-by-step through simulations of all types of cyberattack scenarios. Referring to past cases of cyberattacks, they will present investigative tools and situational analysis methodologies to hone your capabilities in handling cybersecurity incidents. You will learn to quickly detect cyberattack original appearances and recover normal operations within the practical considerations of limited corporate resources and staff, while utilizing a complex variety of cybersecurity tools that are difficult to manage.
Understanding how hacker techniques work and how to prevent them through hands-on activities
1. Common hacker techniques
2. Conducting root cause analysis for system administrators
3. Hands-on solution implementation
Twenty-two (22) notebook computers to be prepared by the organizer
Computer operations and networking knowledge and skills
By practicing of incident response, you will understand the various TTPs of APT attack. Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.
You will be devided into teams and help each other to see the whole scope of incident from an single alert.
Learn how to see the whole scope of incident from an single alert.
a. Tools for Investigation
b. Practice of Incident Response
c. Sample Analysis
d. Powershell Script Analysis
e. Case Report and Review
CPU QUAD-CORE / 8GB RAM / CHROME or FIREFOX browser
Experience of Investigation / Malware Analysis / Linux OS / Windows event log / Tools for Investigatoin(ex. sysinternals)
Nowadays, the ever-changing hacking techniques makes analysis more challenging. However, be it just or evil, everything is traceable on the Internet. With years of practical experiences, the cyber security consultant from CHT Security will talk about the latest attacking techniques and countermeasures, in the meantime introducing powerful network forensics tools to guide you in search of any malicious activity throughout the interconnected computer networks and of the root cause, and eventually block hackers from intruding.
As an emerging cyber threat, a hacker group will erase or encrypt their tracks in a cyber attack. The only record that cannot be deleted is the network log of intrusion. In this training, you will learn basic attacking and defensive skills and how to find suspicious and malicious activities in network traffic.
This course includes introduction to hacking techniques, digital forensics mindset and tools, attack and defense exercises, and network forensics practices and CTF competition.
1. Laptop memory: 4G RAM
2. OS: Windows 7 or higher
3. Browser: Chrome or Firefox
4. Able to connect to Wi-Fi
5. Notepad++ installation is recommended.
Suitable for those with basic knowledge of networking.
Cyber attacks on companies are becoming more common and sophisticated. In response, the National Institute of Standards and Technology (NIST) is updating their policy framework to address this new trend. The standard cyber security model is shifting from cyber security (securing the system from being hacked) to cyber resilience (being able to quickly pinpoint the root cause and recover from the breach). Companies are increasingly concentrating their efforts in being able to quickly recover and resume operations in the event of an attack.
In this course, you will learn blue-team tactics and strategies. The tools and processes on how to monitor, hunt, and investigate cyber threats will be introduced. Several cyber intrusion cases will be used to explain how a digital forensic investigation is conducted to delineate the storyline of breach. Through these cases, you will understand the tactics, techniques, and procedures that a hacker uses, and utilize this knowledge to better identify indicators of compromise and suspicious behavior. There will be hands-on exercises to walk you through different cyber attack cases. Through these exercises, you will understand the inner workings of hackers and have a better idea on how to conduct high-quality analysis of future cyber attacks.
The hands-on training of this course will help you understand the different cyber attack scenarios and investigation methods. Additionally, you will become more familiar with the tools that are employed during each investigation phase and develop the critical thinking skills and mindset. By the end of this course, you will have a stronger understanding on how to better detect and respond to a cyber threat and to ensure that the company assets are protected.
1. Cyber Threat Hunting Introduction
2. Case Sharing
3. Hands-on Practice and Review
4. Summary and Discussion
Bring your own laptop. The laptop should be equipped with at least 4G of memory and have the Google Chrome web browser installed.
IT related work experience; some basic entry-level understanding of red team attack tactics.