Incident Response Project Course Course

Practice your incident response skills with this project.

7 hours, 32 minutes

Course description

Use your incident response skills along with tools like Wireshark, Zeek and Volatility to respond to real-world scenarios. In the first project, you'll investigate a "watering hole attack" that may have affected someone in the IT department. In the second project, you'll need to investigate an SQL injection attack that may have led to credit card data being exfiltrated.

Syllabus

SolarWinds project files

File - 02:00:00

Download the files you need to complete this SolarWinds project.
SolarWinds project instructions

File - 00:10:00

Project 2 Files

File - 02:00:00

This downloadable .zip file contains challenges for the second, more challenging project, including an overview, 12 challenge questions, a pcap and memory dump of the primary Card Data Environment (CDE) server, and the answers to the challenges to verify your work.
Project 1 Files

File - 01:00:00

This downloadable .zip file contains challenges for the first project, including an overview, 10 challenge questions, a memory dump and pcap file, and the answers to the challenges to verify your work.
Incident Response Kali VM

File - 02:00:00

Download the files needed to set up your Kali virtual machine.
SolarWinds project hints

Video - 00:09:00

This video provides some helpful hints if you get stuck.
SolarWinds project walkthrough

Video - 00:07:00

The recent Solarwinds Supply Chain Attack was a significant and shocking punch to the cybersecurity world. It marked the first time we'd seen in a supply chain attack in public executed at such a large scale. One of the top cybersecurity firms in the world ended up being compromised due to this attack. In this course, we will take a technical deep dive into how to look for some of the IoC's or Indicators of Compromise associated with that hack. This course will require hands-on exercises to complete the associated project. We recommend you complete the rest of the courses in this path before attempting this one as the hands-on builds from the deep dives in the rest of this path.
Project 2 Walkthrough Video

Video - 00:02:00

An overview of the second incident response project. You'll respond to an incident involving possible SQL injection that affected credit card data.
Project 1 Walkthrough Video

Video - 00:02:00

An overview of the first incident response project. You'll respond to an incident involving an employee being compromised, using tools to practice penetration testing. Note: Those with further questions are encouraged to rewatch the videos found in the earlier "Tools of the Trade" course.
Kali VM Instructional Video

Video - 00:03:00

Get an overview of the virtual machine you will use to complete the two incident response projects.

Meet the author

Keatron Evans

Keatron is a highly experienced cybersecurity expert and VP of Portfolio and Product Strategy at Infosec with a wealth of expertise. Keatron is a respected author, instructor and speaker who holds numerous cybersecurity certifications and regularly contributes as a subject matter expert for major media outlets.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust