Project description
Use your incident response skills along with tools like Wireshark, Zeek and Volatility to respond to real-world scenarios. In the first project, you’ll investigate a “watering hole attack” that may have affected someone in the IT department. In the second project, you’ll need to investigate an SQL injection attack that may have led to credit card data being exfiltrated.
Contents
Project 1 Files
File — 01:00:00
This downloadable .zip file contains challenges for the first project, including an overview, 10 challenge questions, a memory dump and pcap file, and the answers to the challenges to verify your work.
Project 1 Walkthrough Video
Video — 00:02:21
An overview of the first incident response project. You’ll respond to an incident involving an employee being compromised while using tools to practice penetration testing.
Project 2 Files
File — 02:00:00
This downloadable .zip file contains challenges for the second, more challenging project, including an overview, 12 challenge questions, a pcap and memory dump of the primary Card Data Environment (CDE) server, and the answers to the challenges to verify your work.
Project 2 Walkthrough Video
Video — 00:01:46
An overview of the second incident response project. You’ll respond to an incident involving possible SQL injection that affected credit card data.
Incident Response Kali VM
File — 02:00:00
Download the files needed to set up your Kali virtual machine.
Kali VM Instructional Video
Video — 00:02:42
Get an overview of the virtual machine you will use to complete the two incident response projects.
SolarWinds project instructions
File — 00:10:00
SolarWinds project VM
File — 02:00:00
SolarWinds project walkthrough
Video — 00:07:02
The recent Solarwinds Supply Chain Attack was a significant and shocking punch to the cybersecurity world. It marked the first time we’d seen in a supply chain attack in public executed at such a large scale. One of the top cybersecurity firms in the worl
SolarWinds project hints
Video — 00:08:36
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments