دوره آموزشی SANS FOR508

  • آنلاین
    دوره SANS FOR508
    قیمت 5,000,000 تومان
    مدت زمان(ساعت) 36
    برنامه شنبه، چهارشنبه 20 الی 22
    تاریخ شروع شنبه، 15 اردیبهشت 1403

    اساتید

    مهندس کریمی

دوره آموزشی SANS FOR508

(Advanced Incident Response, Threat Hunting, and Digital Forensics)

دوره SANS FOR508 ازجمله دوره‌های مربوط به حوزه شکار تهدیدات امنیتی و پاسخ به اتفاقات پیشرفته موجود است. تمرکز این دوره بر روی آموزش نیروها در راستای تشخیص نفوذهای موجود می‌باشد. شناسایی سیستم‌های به‌خطر افتاده و آسیب‌دیده، ارزیابی خسارت‌های ایجاد شده، مهار یا شکار حوادث و... ازجمله مباحثی هستند که در سرفصل‌های دوره FOR508 قرار گرفته‌اند.
سازمان‌ها هیچ‌گاه نمی‌توانند اطمینان کامل دهند که اقدامات امنیتی آن‌ها غیرقابل نفوذ خواهد بود. بلکه همواره باید به‌دنبال بدست آوردن اطلاعات کافی از حوادث یا حملات ممکن باشند. هنگامی که نفوذی درحال انجام باشد، شکار آن و یا فارنزیک آن نفوذ، می‌تواند از به سرقت رفتن اطلاعات جلوگیری کند. درحقیقت روند شکار تهدیدات، پیش از اینکه مهاجمان اهداف خود را به اتمام رسانده و آسیب‌های قابل توجهی به سازمان وارد کنند، انجام می‌گیرد. شکار تهدید از رفتارهای کسی که قصد تداخل دارد شناخته‌شده، و برای بررسی شبکه و نقاط پایانی به منظور شناسایی نقض اطلاعات جدید، انجام می‌شود. هدف از ارائه این دوره مشخص کردن سیستم‌های مورد حمله قرار گرفته و شناسایی نفوذهای موجود به سیستم‌های اطلاعاتی خواهد بود. دوره SANS508 ازجمله دوره‌های پیشرفته دنیای فارنزیک و پاسخگویی به حوادث به‌شمار می‌رود. شکار تهدیدات در طی چندسال گذشته، ازطریق روش‌های قدیمی بسیار سخت و گاهاً قابل استفاده نبوده است. بدین‌ترتیب دوره SANS FOR508 با استفاده از مهارت‌های پیشرفته موجود، سعی در ارتقاء دانش متخصصان حوزه امنیت و فارنزیک در این زمینه را دارد. مباحث تئوری، روش‌های به‌روز و کارگاه‌های عملی ازجمله بخش‌های مورد تدریس در این دوره خواهند بود. 

مزایای آکادمی لیان

سرفصل‌های دوره SANS FOR508

تاکتیک‌ها و رویه‌های شکار تهدید و واکنش به حادثه در چند سال گذشته به سرعت تکامل یافته‌اند. تیم شما دیگر نمی‌تواند از تکنیک‌های قدیمی واکنش به حادثه و شکار تهدید استفاده کند که به درستی سیستم‌های در معرض خطر را شناسایی نمی‌کنند. FOR508 مهارت‌های پیشرفته‌ای را برای شکار، شناسایی، مقابله و بازیابی از طیف گسترده‌ای از تهدیدات در شبکه‌های سازمانی، از جمله گروه‌های APT، سندیکاهای جرایم سازمان‌یافته، و اپراتورهای باج‌افزار آموزش می‌دهد.

content-photos/153/4084/zQt28rQ2ZQOx2YaG_6.webp

سرفصل‌های دوره SANS FOR508

تاکتیک‌ها و رویه‌های شکار تهدید و واکنش به حادثه در چند سال گذشته به سرعت تکامل یافته‌اند. تیم شما دیگر نمی‌تواند از تکنیک‌های قدیمی واکنش به حادثه و شکار تهدید استفاده کند که به درستی سیستم‌های در معرض خطر را شناسایی نمی‌کنند. FOR508 مهارت‌های پیشرفته‌ای را برای شکار، شناسایی، مقابله و بازیابی از طیف گسترده‌ای از تهدیدات در شبکه‌های سازمانی، از جمله گروه‌های APT، سندیکاهای جرایم سازمان‌یافته، و اپراتورهای باج‌افزار آموزش می‌دهد.

content-photos/153/4084/zQt28rQ2ZQOx2YaG_6.webp

Overview

 

There are ways to gain an advantage against adversaries targeting you - it starts with the right mindset and knowing what works

 

The last decade has not been kind to network defenders. Threats to the modern enterprise are legion and attackers have used the enormous complexity of enterprise networks against us. But the tide is shifting. Over the past decade, we have seen a dramatic increase in sophisticated attacks against organizations. Nation-state attacks originating from the intelligence services of countries like China and Russia, often referred to as Advanced Persistent Threat (APT) actors, have proved difficult to suppress. Massive financial attacks from the four corners of the globe have resulted in billions of dollars in losses. Ransomware and extortion became an existential threat almost overnight. While the odds are stacked against us, the best security teams are proving that these threats can be managed and mitigated. FOR508 aims to bring those hard-won lessons into the classroom.

This course was designed to help organizations increase their capability to detect and respond to intrusion events. This is an achievable goal and begins by teaching the tools and techniques necessary to find evil in your network. This course is designed to make you and your organization an integral part of the solution. To keep pace, incident responders and threat hunters must be armed with the latest tools, analysis techniques, and enterprise methodologies to identify, track, and contain advanced adversaries with the ultimate goal of rapid remediation of incidents and damage mitigation. Further, incident response and threat hunting analysts must be able to scale their efforts across potentially thousands of systems in the enterprise. We start the day by examining the six-step incident response methodology as it applies to incident response for advanced threat groups. The importance of developing cyber threat intelligence to impact the adversaries' "kill chain" is discussed and forensic live response techniques and tactics are demonstrated that can be applied both to single systems and across the entire enterprise.

Understanding attacks is critical to being able to detect and mitigate them. We start our education of attacker techniques on day one, learning common malware and attack characteristics and diving deep into techniques used by adversaries to maintain persistence in the network. Persistence is typically completed early in the attack cycle and students will learn hunting techniques to audit the network and accomplish early discovery. Living off the land binaries (local tools available in most environments), PowerShell, and WMI-based attacks in particular have become standard operating procedure for advanced adversaries and students get a lot of practice with tools and techniques to identify such attacks at scale. We end the day with an in-depth discussion of Microsoft credentialing. The complexity of credentials in the modern enterprise cannot be overstated and credentials are the number one vulnerability present in every network. By understanding the tools and techniques being used to target credentials, students learn how to prevent, detect, and mitigate these devastating attacks.

 

 

Exercises

 

  • Forensic Lab Setup and Orientation Using the SIFT Workstation
  • APT Incident Response Scenario Introduction
  • Malware Persistence Detection and Analysis
  • Creating Local and Remote Triage Evidentiary Images with KAPE
  • Scaling Remote Endpoint Incident Response, Hunting, and Analysis Using Velociraptor

 

Topics

Real Incident Response Tactics

  • Preparation: Key tools, techniques, and procedures that an incident response team needs to respond properly to intrusions
  • Identification/Scoping: Proper scoping of an incident and detecting all compromised systems in the enterprise
  • Containment/Intelligence Development: Restricting access, monitoring, and learning about the adversary in order to develop threat intelligence
  • Eradication/Remediation: Determining and executing key steps that must be taken to help stop the current incident and the move to real-time remediation
  • Recovery: Recording of the threat intelligence to be used in the event of a similar adversary returning to the enterprise
  • Avoiding "Whack-A-Mole" Incident Response: Going beyond immediate eradication without proper incident scoping/containment

 

Threat Hunting

  • Hunting versus Reactive Response
  • Intelligence-Driven Incident Response
  • Building a Continuous Incident Response/Threat Hunting Capability
  • Forensic Analysis versus Threat Hunting Across Endpoints
  • Threat Hunt Team Roles
  • ATT&CK - MITRE's Adversarial Tactics, Techniques, and Common Knowledge

 

Threat Hunting in the Enterprise

 

  • Identification of Compromised Systems
  • Finding Active and Dormant Malware
  • Digitally Signed Malware
  • Malware Characteristics
  • Common Hiding and Persistence Mechanisms
  • Finding Evil by Understanding Normal

Incident Response and Hunting Across the Enterprise

 

  • Rapid Response Tooling Solutions
  • PowerShell Remoting
  • PowerShell Remoting Credential Safeguards
  • Kansa PowerShell Remoting IR Framework
  • KAPE Triage Collection Tool
  • Velociraptor Incident Response Platform

 

 

Malware Defense Evasion and Identification

  • Service Hijacking/Replacement
  • Frequent Compilation
  • Binary Padding
  • Packing/Armoring
  • Dormant Malware
  • Signing Code with Valid Certificates
  • Anti-Forensics/Timestomping
  • Living of the Land Binaries and Security Tool Evasion

 

Malware Persistence Identification

  • AutoStart Locations, RunKeys
  • Service Creation/Replacement
  • Service Failure Recovery
  • Scheduled Tasks
  • DLL Hijacking Attacks
  • WMI Event Consumers

 

Prevention, Detection, and Mitigation of Credential Theft

  • Pass the Hash
  • Credential Attacks with Mimikatz
  • Token Stealing
  • Cached Credentials
  • LSA Secrets
  • Kerberos Attacks
  • Golden Tickets
  • Kerberoasting
  • DCSync
  • NTDS.DIT theft
  • Bloodhound and Active Directory Graphing
  • Common dumping tools including Metasploit, Acehash, Windows Credential Editor, and many others.

Overview

Even the most advanced adversaries leave footprints everywhere. Learn the secrets of the best hunters.

Cyber defenders have a wide variety of tools and artifacts available to identify, hunt, and track adversary activity in a network. Each attacker action leaves a corresponding artifact, and understanding what is left behind as footprints can be crucial to both red and blue team members. Attacks follow a predictable pattern, and we focus our detective efforts on immutable portions of that pattern. As an example, at some point an attacker will need to run code to accomplish their objectives. We can identify this activity via application execution artifacts. The attacker will also need one or more accounts to run code. Consequently, account auditing is a powerful means of identifying malicious. An attacker also needs a means to move throughout the network, so we look for artifacts left by the relatively small number of ways there are to accomplish internal lateral movement. In this section, we cover common attacker tradecraft and discuss the various data sources and forensic tools you can use to identify malicious activity in the enterprise.

Get ready to hunt!

 

Exercises

  • Hunting and Detecting Evidence of Execution at Scale with Prefetch, Shimcache and Amcache
  • Discovering Credential abuse with Event Log Collection and Analysis
  • Tracking Lateral Movement with Event Log Analysis
  • Hunting Malicious use of WMI and PowerShell
  • Microsoft Defender Log Analysis

 

 

 

 

Topics

Advanced Evidence of Execution Detection

  • Attacker Tactics, Techniques, and Procedures (TTPs) Observed Via Process Execution
  • Prefetch Analysis
  • Application Compatibility Cache (ShimCache)
  • Amcache Registry Examination
  • Scaling ShimCache and Amcache Investigations

 

Lateral Movement Adversary Tactics, Techniques, and Procedures (TTPs)

  • Compromising Credentials Techniques
  • Remote Desktop Services Misuse
  • Windows Admin Share Abuse
  • PsExec and Cobalt Strike Beacon PsExec Activity
  • Windows Remote Management Tool Techniques
  • PowerShell Remoting/WMIC Hacking
  • Cobalt Strike Lateral Movement and Credential Use
  • Vulnerability Exploitation

 

Log Analysis for Incident Responders and Hunters

  • Profiling Account Usage and Logons
  • Tracking and Hunting Lateral Movement
  • Identifying Suspicious Services
  • Detecting Rogue Application Installation
  • Finding Malware Execution and Process Tracking
  • Capturing Command Lines and Scripts
  • Anti-Forensics and Event Log Clearing

 

Investigating WMI and PowerShell-Based Attacks

  • WMI Overview
  • WMI Attacks Across the Kill Chain
  • Auditing the WMI Repository
  • WMI File System and Registry Residue
  • Command-Line Analysis and WMI Activity Logging
  • PowerShell Transcript and ScriptBlock Logging
  • Discovering Cobalt Strike beacon PowerShell Import Activity
  • Detecting PowerShell Injection from Cobalt Strike, Metasploit, and Empire
  • PowerShell Script Obfuscation
  • Microsoft Defender Logs, Detection History, and MPLog Analysis

Overview

Using memory analysis sometimes feels like cheating - finding active attacks shouldn't be this easy.

Memory forensics has come a long way in just a few years. It is now a critical component of many advanced tool suites (notably EDR) and the mainstay of successful incident response and threat hunting teams. Memory forensics can be extraordinarily effective at finding evidence of worms, rootkits, PowerShell attacks, ransomware precursors, and advanced malware used by targeted attackers. In fact, some fileless attacks may be nearly impossible to unravel without memory analysis. Memory analysis was traditionally the domain of Windows internals experts and reverse engineers, but new tools, techniques, and detection heuristics have greatly leveled the playing field making it accessible today to all investigators, incident responders, and threat hunters. Further, understanding attack patterns in memory is a core analyst skill applicable across a wide range of endpoint detection and response (EDR) products, making those tools even more effective. This extremely popular section will cover many of the most powerful memory analysis capabilities available and give analysts a solid foundation of advanced memory forensic skills to super-charge investigations, regardless of the toolset employed.

Exercises

 

  • Detect unknown live and dormant custom malware in memory across multiple systems in an enterprise environment
  • Examine Windows process trees to identify normal versus anomalies
  • Find advanced "beacon" malware over common ports used by targeted attackers to access command and control (C2) channels
  • Find residual attacker command-line activity through scanning strings in memory and by extracting command history buffer data
  • Extract cached files from memory, including those opened from encrypted archives or removable media
  • Leverage cached versions of the MFT and the Windows registry to perform traditional forensic analysis using only a memory image
  • Compare compromised system memory against a baseline system using Frequency of Least Occurrence stacking techniques
  • Identify advanced malware hiding techniques, including code injection and rootkits
  • Understand Bring Your Own Vulnerable Driver (BYOVD) attacks and how to find them
  • Employ indicators of compromise to automate analysis
  • Analysis of memory from infected systems:

 

  • Stuxnet
  • TDL3/ TDSS
  • CozyDuke APT29 RAT
  • Rundll32 and Living Off the Land Executions
  • Zeus/Zbot/Zloader
  • Amadey
  • Emotet
  • SolarMarker/Jupyter
  • Black Energy Rootkit
  • WMI and PowerShell
  • Cobalt Strike Beacons and Powerpick
  • Cobalt Strike Sacrificial Processes
  • Metasploit Meterpreter
  • Custom APT command and control malware

Topics

  • Endpoint Detection and Response (EDR)
  • EDR Capabilities and Challenges
  • EDR and Memory Forensics

 

  • Memory Acquisition
  • Acquisition of System Memory
  • Hibernation and Pagefile Memory Extraction and Conversion
  • Virtual Machine Memory Acquisition
  • Memory changes in Windows 10 and 11

 

  • Memory Forensics Analysis Process for Response and Hunting
  • Understanding Common Windows Services and Processes
  • Identify Rogue Processes
  • Analyze Process Objects
  • Review Network Artifacts
  • Look for Evidence of Code Injection
  • Audit Drivers and Rootkit Detection
  • Dump Suspicious Processes and Drivers

 

  • Memory Forensics Examinations
  • Live Memory Forensics
  • Memory Analysis with Volatility
  • Webshell Detection Via Process Tree Analysis
  • Code Injection, Malware, and Rootkit Hunting in Memory
  • Advanced Memory Forensics with MemProcFS
  • WMI and PowerShell Process Anomalies
  • Extract Memory-Resident Adversary Command Lines
  • Investigate Windows Services
  • Hunting Malware Using Comparison Baseline Systems
  • Find and Dump Cached Files from RAM

 

  • Memory Analysis Tools
  • Velociraptor
  • Volatility
  • MemProcFS

Overview

Timeline analysis will change the way you approach digital forensics, threat hunting, and incident response...forever.

 

Learn advanced incident response and hunting techniques uncovered via timeline analysis directly from the authors who pioneered timeline analysis tradecraft. Temporal data is located everywhere on a computer system. Filesystem modified/access/creation/change times, log files, network data, registry data, and browser history files all contain time data that can be correlated and analyzed to rapidly solve cases. Pioneered by Rob Lee as early as 2001, timeline analysis has grown to become a critical incident response, hunting, and forensics technique. New timeline analysis frameworks provide the means to conduct simultaneous examinations on a multitude of systems across a multitude of forensic artifacts. Analysis that once took days now takes minutes.

This section will step you through two primary methods of building and analyzing timelines used during advanced incident response, threat hunting, and forensic cases. Exercises will show analysts how to create timelines and how to introduce the key analysis methods necessary to help you use those timelines effectively in your cases.

 

 

 

Exercises

  • Detecting malware defense evasion techniques
  • Using timeline analysis, track adversary activity by hunting an APT group's footprints of malware, lateral movement, and persistence
  • Target hidden and time-stomped malware and utilities that advanced adversaries use to move in the network and maintain their presence
  • Track advanced adversaries' actions second-by-second through in-depth super-timeline analysis
  • Observe how attackers laterally move to other systems in the enterprise by watching a trail left in filesystem times, registry, event logs, shimcache, and other temporal-based artifacts
  • Identify root cause of an intrusion
  • Learn how to filter system artifact, file system, and registry timelines to target the most important data sources efficiently

 

 

 

 

 

 

 

Topics

Malware Defense Evasion and Detection

  • Indicators of Compromise - YARA
  • Entropy and Packing Analysis
  • Executable Anomaly Detection
  • Digital Signature Analysis

 

Timeline Analysis Overview

  • Timeline Benefits
  • Prerequisite Knowledge
  • Finding the Pivot Point
  • Timeline Context Clues
  • Timeline Analysis Process

 

Filesystem Timeline Creation and Analysis

  • MACB Timestamps
  • Windows Time Rules (File Copy versus File Move)
  • Filesystem Timeline Creation Using Sleuthkit, fls and MFTECmd
  • Bodyfile Analysis and Filtering Using the mactime Tool

 

Super Timeline Creation and Analysis

  • Super Timeline Artifact Rules
  • Program Execution, File Knowledge, File Opening, File Deletion
  • Timeline Creation with log2timeline/Plaso
  • log2timeline/ Plaso Components
  • Filtering the Super Timeline Using psort
  • Targeted Super Timeline Creation
  • Super Timeline Analysis Techniques
  • Scaling Super Timeline Analysis with Elastic Search (ELK)

Overview

Advanced adversaries are always improving. We must keep pace

Attackers commonly take steps to hide their presence on compromised systems. While some anti-forensics steps can be relatively easy to detect, others are much harder to deal with. As such, it's important that forensic professionals and incident responders are knowledgeable on various aspects of the operating system and file system which can reveal critical residual evidence. Criminal and ransomware syndicates have become particularly aggressive in their use of anti-forensic techniques. In this section, we focus on recovering files, file fragments, and file metadata of interest to the investigation. These trace artifacts can help the analyst uncover deleted logs, attacker tools, malware configuration information, exfiltrated data, and more. This often results in a deeper understanding of the attacker TTPs and provides more threat intelligence for rapid scoping of an intrusion and mitigating damage. In some cases, these deep-dive techniques could be the only means for proving that an attacker was active on a system of interest and ultimately determining root cause. While very germane to intrusion cases, these techniques are applicable in nearly every forensic investigation.

Exercises

  • Volume shadow snapshot analysis
  • Timelines incorporating volume shadow snapshot data
  • Anti-Forensics analysis using NTFS filesystem components
  • Timestomp identification and suspicious file detection
  • Advanced data recovery with records carving and deleted volume shadow copy recovery

 

 

 

 

 

 

 

 

 

 

Topics

Volume Shadow Copy Analysis

  • Volume Shadow Copy Service
  • Options for Accessing Historical Data in Volume Snapshots
  • Accessing Shadow Copies with vshadowmount
  • Volume Shadow Copy Timelining

 

Advanced NTFS Filesystem Tactics

  • NTFS Filesystem Analysis
  • Master File Table (MFT) Critical Areas
  • NTFS System Files
  • NTFS Metadata Attributes
  • Rules of Windows Timestamps for $StdInfo and $Filename
  • Detecting Timestamp Manipulation
  • Resident versus Nonresident Files
  • Alternate Data Streams
  • NTFS Directory Attributes
  • B-Tree Index Overview and Balancing
  • Finding Wiped/Deleted Files using the $I30 indexes
  • Filesystem Flight Recorders: $Logfile and $UsnJrnl
  • Common Activity Patterns in the Journals
  • Useful Filters and Searches in the Journals
  • What Happens When Data Is Deleted from an NTFS Filesystem?

 

Advanced Evidence Recovery

  • Markers of Common Wipers and Privacy Cleaners
  • Deleted Registry Keys
  • Detecting "Fileless" Malware in the Registry
  • File Carving
  • Volume Shadow Carving
  • Carving for NTFS artifacts and Event Log Records
  • Effective String Searching
  • NTFS Configuration Changes to Combat Anti-Forensics

Overview

This incredibly rich and realistic enterprise intrusion exercise is based on a real-world advanced persistent threat (APT) group. It brings together techniques learned earlier in the course and tests your newly acquired skills in an investigation into an attack by an advanced adversary. The challenge brings it all together using a real intrusion into a complete Windows enterprise environment. You will be asked to uncover how the systems were compromised in the initial intrusion, find other compromised systems via adversary lateral movement, and identify intellectual property stolen via data exfiltration. Solving the final intrusion lab requires investigating artifacts on over thirty systems including Windows 10 and 11 workstations, DMZ servers, a domain controller, internal development servers, and hosted Exchange email. You will walk out of the course with hands-on experience investigating a real attack, curated by a cadre of instructors with decades of experience fighting advanced threats from attackers ranging from nation-states to financial crime syndicates to top-level ransomware groups.

Topics

  • The Intrusion Forensic Challenge requires analysis of multiple systems from an enterprise network with many endpoints.
  • Learn to identify and track attacker actions across an entire network finding initial exploitation, reconnaissance, persistence, credential dumping, lateral movement, elevation to domain administrator, and data theft/exfiltration
  • Witness and participate in a team-based approach to incident response.
  • Discover evidence of some of the most common and sophisticated attacks in the wild including Cobalt Strike, Sliver, Covenant, Remote Monitoring and Management (RMM) tools, PowerShell exploit frameworks, and custom nation-state malware.
  • During the challenge, each incident responder will be asked to answer key questions and address critical issues in the different categories listed below, just as they would during a real breach in their organizations:

IDENTIFICATION AND SCOPING:

1. How and when was the network breached? Which system is "Patient Zero"?

2. How did the initial infection occur giving the attackers a foothold? What type of exploit was used?

3. When and how did the attackers first laterally move to each system?

4. What were the attacker's primary and secondary command and control backdoors?

 

CONTAINMENT AND THREAT INTELLIGENCE GATHERING:

5. How and when did the attackers obtain domain administrator credentials?

6. What did the attackers look for on each system?

7. Damage Assessment: what data was stolen?

8. Damage Assessment: was email accessed or stolen?

9. Was any evidence of anti-forensics activity discovered?

10. Were the attackers able to access any cloud-based resources like cloud computing resources or cloud storage data?

11. Threat Intelligence: catalog host-based and network indicators of compromise.

 

REMEDIATION AND RECOVERY:

12. What level of account compromise occurred? Is a full password reset required during remediation?

13. Based on the attacker techniques and tools discovered during the incident, what are the recommended steps to remediate and recover from this incident?

a. What systems need to be rebuilt?

b. What IP addresses need to be blocked?

c. What countermeasures should we deploy to slow or stop these attackers if they come back?

d. What recommendations would you make to detect these intruders in our network again?

FOR508 یک دوره پیشرفته با محوریت واکنش به حوادث و شکار تهدیدات است که تمرکز خود را بر روی کشف و پاسخ به تهدیدات پیشرفته موجود و جرائم سازماندهی شده قرار داده است. ما در این دوره به مقدمات و پایه‌های پاسخ به حوادث، فارنزیک دیجیتال ویندوز یا تکنیک‌های هک نمی‌پردازیم. بلکه مباحث جزئی‌تر و پیشرفته‌تر در این زمینه را ارائه خواهیم کرد. درنتیجه برای شروع این دوره نیازمند گذراندن دوره‌ی FOR500 که در زمینه فارنزیک ویندوز می‌باشد، خواهید بود. پیش از همه‌ی این مباحث نیز گذراندن دوره CEH برای افرادی که قصد ورود به دنیای هک و امنیت را دارند، ضروری‌ست. 

در این دوره به طور گسترده از SIFT Workstation برای آموزش پاسخ دهندگان به حوادث و تحلیل‌گران فارنزیک استفاده می‌شود تا چگونگی پاسخ به حملات و تحقیقات پیچیده را به شما آموزش دهیم. SIFT شامل صدها ابزار رایگان و اپن سورس است که برای شناخت بهتر کار با آن‌ها، نیازمند آموزش خواهید بود. 

اعضای تیم پاسخگویی حوادث که مرتباً با حوادث پیچیده امنیتی، هجوم گروه‌های APT، هکرهای پیشرفته و ... در ارتباط هستند و باید بدانند که چگونه سیستم‌های به خطر افتاده را شناسایی کنند و از بین ببرند.

  • شکارچیان تهدیدات سایبری که به دنبال درک کامل تهدیدها و چگونگی یادگیری از آن‌ها هستند تا بتوانند به‌طور موثر تهدیدها را شناسایی کرده و با آن‌ها مقابله کنند.
  • تحلیلگران SOC که به دنبال درک بهتر هشدارها و ایجاد مهارت‌های لازم برای مقابله هستند.
  • متخصصان امنیت اطلاعات که مستقیماً در پاسخ به حوادث و تجاوزات نقض داده، از آن‌ها پشتیبانی می‌کنند.
  • اعضای تیم آزمایش‌کننده تست نفوذ که می‌خواهند اشتباهات رایجی که منجربه دسترسی‌های غیرمجاز و خطرهای گوناگون می‌شود را شناسایی کنند.
  • مدیران امنیت اطلاعات، مدیران فناوری اطلاعات، کارشناسان امنیت و...
  • و دانشجویان و علاقمندانی که پیشنیازهای این دوره را فراهم کرده و آماده شروع دوره SANS508 هستند.