Incident Response Project

Practice your incident response skills with this project.

7 hours, 32 minutes

Project Description

Use your incident response skills along with tools like Wireshark, Zeek and Volatility to respond to real-world scenarios. In the first project, you'll investigate a "watering hole attack" that may have affected someone in the IT department. In the second project, you'll need to investigate an SQL injection attack that may have led to credit card data being exfiltrated.

Contents

SolarWinds project VM

File - 02:00:00

SolarWinds project instructions

File - 00:10:00

Incident Response Kali VM

File - 02:00:00

Download the files needed to set up your Kali virtual machine.
Project 2 Files

File - 02:00:00

This downloadable .zip file contains challenges for the second, more challenging project, including an overview, 12 challenge questions, a pcap and memory dump of the primary Card Data Environment (CDE) server, and the answers to the challenges to verify your work.
Project 1 Files

File - 01:00:00

This downloadable .zip file contains challenges for the first project, including an overview, 10 challenge questions, a memory dump and pcap file, and the answers to the challenges to verify your work.
SolarWinds project hints

Video - 00:09:00

SolarWinds project walkthrough

Video - 00:07:00

The recent Solarwinds Supply Chain Attack was a significant and shocking punch to the cybersecurity world. It marked the first time we'd seen in a supply chain attack in public executed at such a large scale. One of the top cybersecurity firms in the world ended up being compromised due to this attack. In this course, we will take a technical deep dive into how to look for some of the IoC's or Indicators of Compromise associated with that hack. This course will require hands-on exercises to complete the associated project. We recommend you complete the rest of the courses in this path before attempting this one as the hands-on builds from the deep dives in the rest of this path.
Kali VM Instructional Video

Video - 00:03:00

Get an overview of the virtual machine you will use to complete the two incident response projects.
Project 2 Walkthrough Video

Video - 00:02:00

An overview of the second incident response project. You'll respond to an incident involving possible SQL injection that affected credit card data.
Project 1 Walkthrough Video

Video - 00:02:00

An overview of the first incident response project. You'll respond to an incident involving an employee being compromised while using tools to practice penetration testing.

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments