Incident Response Project Course Course
7 hours, 32 minutes
Course description
Use your incident response skills along with tools like Wireshark, Zeek and Volatility to respond to real-world scenarios. In the first project, you'll investigate a "watering hole attack" that may have affected someone in the IT department. In the second project, you'll need to investigate an SQL injection attack that may have led to credit card data being exfiltrated.Syllabus
SolarWinds project files
File - 02:00:00
Download the files you need to complete this SolarWinds project.
SolarWinds project instructions
File - 00:10:00
Project 2 Files
File - 02:00:00
This downloadable .zip file contains challenges for the second, more challenging project, including an overview, 12 challenge questions, a pcap and memory dump of the primary Card Data Environment (CDE) server, and the answers to the challenges to verify your work.
Project 1 Files
File - 01:00:00
This downloadable .zip file contains challenges for the first project, including an overview, 10 challenge questions, a memory dump and pcap file, and the answers to the challenges to verify your work.
Incident Response Kali VM
File - 02:00:00
Download the files needed to set up your Kali virtual machine.
SolarWinds project hints
Video - 00:09:00
This video provides some helpful hints if you get stuck.
SolarWinds project walkthrough
Video - 00:07:00
The recent Solarwinds Supply Chain Attack was a significant and shocking punch to the cybersecurity world. It marked the first time we'd seen in a supply chain attack in public executed at such a large scale. One of the top cybersecurity firms in the world ended up being compromised due to this attack. In this course, we will take a technical deep dive into how to look for some of the IoC's or Indicators of Compromise associated with that hack. This course will require hands-on exercises to complete the associated project. We recommend you complete the rest of the courses in this path before attempting this one as the hands-on builds from the deep dives in the rest of this path.
Project 2 Walkthrough Video
Video - 00:02:00
An overview of the second incident response project. You'll respond to an incident involving possible SQL injection that affected credit card data.
Project 1 Walkthrough Video
Video - 00:02:00
An overview of the first incident response project. You'll respond to an incident involving an employee being compromised, using tools to practice penetration testing. Note: Those with further questions are encouraged to rewatch the videos found in the earlier "Tools of the Trade" course.
Kali VM Instructional Video
Video - 00:03:00
Get an overview of the virtual machine you will use to complete the two incident response projects.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps