Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
Getting started running commands
Security cmdlets
Using and updating the built-in help
Execution policies
Fun tricks with the ISE graphical editor
Piping .NET and COM objects, not text
Using properties and methods of objects
Helping Linux admins feel more at home
Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
Customizing your profile script
PowerShell remote command execution
Security setting across the network
File copy via PowerShell remoting
Capturing the output of commands
Parsing text files and logs with regex patterns
Parsing Security Logs
Searching remote event logs
Mounting the registry as a drive
Security settings in the Registry
Exporting data to CSV, HTML and JSON files
Running scripts as scheduled jobs
Continued Security Compliance
Pushing out scripts through Group Policy
Importing modules and dot-sourcing functions
http://www.PowerShellGallery.com
PowerShell Scripting
PowerShell Scripting to implement Security Practices
Writing your own functions to automate security status and settings
Passing arguments into your scripts
Function parameters and returning output
Flow control: if-then, foreach, that make security decisions
How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]
Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Outline:
Identity and access
Configure Azure Active Directory for Azure workloads and subscriptions
Configure Azure AD Privileged Identity Management
Configure security for an Azure subscription
Platform Protection
Understand cloud security
Build a network
Secure network
Implement host security
Implement platform security
Implement subscription security
Security Operations
Configure security services
Configure security policies by using Azure Security Center
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:
Note: The Certifications in red are recently added to approved list as of 2/4/19
For further information or to schedule for classes, call us at 800-324-2294
TN-575: Open Source Network Security Monitoring teaches students how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. No network is bullet proof and when attackers access your network, this course will show you how to build a security net to detect, contain, and control the attacker. Sensitive data can be monitored and deep packet and deep attachment analysis can be achieved. As organizations stand up a Security Operations Center (SOC) the enterprise NSM is the key ingredient to that SOC. This course not only teaches how to implement an NSM technologically, but how to effectively monitor an enterprise operationally. You will learn how to architect an NSM solution: where to deploy your NSM platforms and how to size them, stand-alone or distributed, and integration into packet analysis, interpret evidence, and integrate threat intelligence from external sources to identify sophisticated attackers. A properly implemented NSM is integral to incident response and provides the responders timely information to react to the incident. TN-575: Open Source Network Security Monitoring is a lab intensive environment with a cyber range that gives each student in-depth knowledge and practical experience monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls.
Attendees to TN-575: Open Source Network Security Monitoring class will receive TechNow approved course materials and expert instruction.
This Course is taught utilizing Security Onion or RockNSM as specified by the customer.
Dates/Locations:
No Events
Duration: 5 Days
Course Objective:
The focus of this course is to present a suite of Open Source security products integrated into a highly functional and scalable Network Security Monitoring solution.
Prerequisites:
Students should have a basic understanding of networks, TCP/IP and standard protocols such as DNS, HTTP, etc. Some Linux knowledge/experience is recommended, but not required
Course Outline:
Network Security Monitoring (NSM) Methodology
High Bandwidth Packet Capture Challenges
Installation of Security Onion
Use Cases (analysis, lab, stand-alone, distributed)
Resource Requirements
Configuration
Setup Phase I – Network Configuration
Setup Phase 2 – Service Configuration
Evaluation Mode vs. Configuration Mode
Verifying Services
Security Onion Architecture
Configuration Files and Folders
Network Interfaces
Docker Environment
Security Onion Containers
Overview of Security Onion Analyst Tools
Kibana
CapME
CyberChef
Squert
Sguil
NetworkMiner
Quick Review of Wireshark and Packet Analysis
Display and Capture Filters
Analyze and Statistics Menu Options
Analysis for Signatures
Analyzing Alerts
Replaying Traffic
3 Primary Interfaces:
Squert
Sguil
Kibana
Pivoting Between Interfaces
Pivoting to Full Packet Capture
Snort and Surricata
Rule Syntax and Construction
Implementing Custom Rules
Implementing Whitelists and Blacklists
Hunting
Using Kibana to Slice and Dice Logs
Hunting Workflow with Kibana
Bro
Introduction and Overview
Architecture, Commands
Understanding and Examining Bro Logs
Using AWK, sort, uniq, and bro-cut
Working with traces/PCAPs
Bro Scripts Overview
Loading and Using Scripts
Bro Frameworks Overview
Bro File Analysis Framework FAF
Using Bro scripts to carve out more than files
RockNSM ( * If Applicable)
Kafka
Installation and Configuration
Kafka Messaging
Brokers
Integration with Bro and FSF
File Scanning Framework FSF
Custom YARA Signatures
JSON Trees
Sub-Object Recursion
Bro and Suricata Integration
Elastic Stack
Adding new data sources in Logstash
Enriching data with Logstash
Automating with Elastalert
Building new Kibana dashboards
Production Deployment
Advanced Setup
Master vs Sensor
Node Types – Master, Forward, Heavy, Storage
Command Line Setup with sosetup.conf
Architectural Recommendations
Sensor Placement
Hardening
Administration
Maintenance
Tuning
Using PulledPork to Disable Rules
BPF’s to Filter Traffic
Spinning up Additional Snort / Suricata / Bro Workers to Handle Higher Traffic Loads
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.
For further information or to schedule for classes, call us at 800-324-2294