Project

Incident Response Project

    Syllabus

  • Project 1 Walkthrough Video Video — 00:02:21
    • An overview of the first incident response project. You’ll respond to an incident involving an employee being compromised while using tools to practice penetration testing.

  • SolarWinds project VM File — 02:00:00
  • SolarWinds project instructions File — 00:10:00
  • Incident Response Kali VM File — 02:00:00
    • Download the files needed to set up your Kali virtual machine.

  • Project 2 Files File — 02:00:00
    • This downloadable .zip file contains challenges for the second, more challenging project, including an overview, 12 challenge questions, a pcap and memory dump of the primary Card Data Environment (CDE) server, and the answers to the challenges to verify your work.

  • Project 1 Files File — 01:00:00
    • This downloadable .zip file contains challenges for the first project, including an overview, 10 challenge questions, a memory dump and pcap file, and the answers to the challenges to verify your work.

  • SolarWinds project hints Video — 00:08:36
  • SolarWinds project walkthrough Video — 00:07:02
    • The recent Solarwinds Supply Chain Attack was a significant and shocking punch to the cybersecurity world. It marked the first time we’d seen in a supply chain attack in public executed at such a large scale. One of the top cybersecurity firms in the world ended up being compromised due to this attack. In this course, we will take a technical deep dive into how to look for some of the IoC’s or Indicators of Compromise associated with that hack. This course will require hands-on exercises to complete the associated project. We recommend you complete the rest of the courses in this path before attempting this one as the hands-on builds from the deep dives in the rest of this path.

  • Kali VM Instructional Video Video — 00:02:42
    • Get an overview of the virtual machine you will use to complete the two incident response projects.

  • Project 2 Walkthrough Video Video — 00:01:46
    • An overview of the second incident response project. You’ll respond to an incident involving possible SQL injection that affected credit card data.

Syllabus

Project description

Use your incident response skills along with tools like Wireshark, Zeek and Volatility to respond to real-world scenarios. In the first project, you’ll investigate a ‘watering hole attack’ that may have affected someone in the IT department. In the second project, you’ll need to investigate an SQL injection attack that may have led to credit card data being exfiltrated.

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments