SEC501: Advanced Security Essentials - Enterprise Defender
- Contents | Schedule | Additional Info
- Instructor: Eric Conrad
- €3,945 €3,695 paid by Oct 2
- GCED Certification
- 36 CPE/CMU
- Laptop Required
Cyber security continues to be a critical area for organizations and will continue to increase in importance as attacks become stealthier, have a greater financial impact on an organization, and cause reputational damage. While Security Essentials lays a solid foundation for the security to engage the battle.
A key theme is that prevention is ideal, but detection is a must. We need to be able to ensure that we constantly improve our security to prevent as many attacks as possible. This prevention/protection occurs on two fronts - externally and internally. Attacks will continue to pose a threat to an organization as data becomes more portable and networks continue to be porous. Therefore a key focus needs to be on data protection, securing our critical information no matter whether it resides on a server, in a robust network architecture, or on a portable device.
Despite an organization's best effort at preventing attacks and protecting its critical data, some attacks will still be successful. Therefore we need to be able to detect attacks in a timely fashion. This is accomplished by understanding the traffic that is flowing on your networks and looking for indication of an attack. It also includes performing penetration testing and vulnerability analysis against an organization to identify problems and issues before a compromise occurs.
Finally, once an attack is detected we must react to it in a timely fashion and perform forensics. By understanding how the attacker broke in, this can be fed back into more effective and robust preventive and detective measures, completing the security lifecycle.
| Course Contents | Instructors | Schedule |
|---|---|---|
| SEC501.1: Defensive Network Infrastructure | Eric Conrad |
Mon Nov 18th, 2013 9:00 AM - 5:00 PM |
OverviewProtecting a network from attack starts with designing, building, and implementing a robust network infrastructure. There are many aspects to implementing a defense-in-depth network that are often overlooked since companies focus too often only on functionality. Achieving the proper balance between business drivers and core protection of information is very difficult, and an organization must build a network that is mission resilient to a variety of attacks that might occur. On the first day students will learn not only how to design and build a network that can both prevent attacks and recover after compromise, but also how to retrofit an existing network to achieve the level of protection that is required. Building a network is easy, but integrating all of the components so the network can withstand a variety of attacks and support the mission of the organization takes a special skill. Students will learn how to design and implement a functionality-rich, secure network and also how to maintain and update it as the threat landscape evolves. CPE/CMU Credits: 6 Topics
|
||
| SEC501.2: Packet Analysis | Eric Conrad |
Tue Nov 19th, 2013 9:00 AM - 5:00 PM |
OverviewPrevention is ideal, but detection is a must - this is a critical motto of security professionals. While organizations always like to prevent as many attacks as possible, some will still sneak into the network. In cases where an attack can not be prevented, security professionals must understand the indications and warnings that are indicative of attack and detect them before they cause significant harm. Packet analysis and intrusion detection is at the core of timely detection. Not only should attacks be detected, but organizations should react to make sure that these attacks can be prevented in the future. Based on the changing landscape of attacks, detecting attacks is becoming more difficult because attacks are now more stealthy and difficult to find. Only by understanding the core principles of traffic analysis can one become a skilled analyst and be able to differ between normal traffic and attack traffic. In addition, new attacks are coming out all the time. So security professionals must be able to write rules that detect new, advanced zero-day attacks before they compromise a network. In the past, traffic analysis and intrusion detection was treated as a separate discipline within many organizations. Today, prevention, detection, and reaction must all be closely knit so that once an attack is detected, defensive measures can be adapted, proactive forensics can be implemented, and the organization can to continue to operate. CPE/CMU Credits: 6 Topics
|
||
| SEC501.3: Pentest | Eric Conrad |
Wed Nov 20th, 2013 9:00 AM - 5:00 PM |
OverviewSecurity is all about understanding, mitigating, and controlling risk to an organization's critical assets. Therefore an organization must understand what the changing threat landscape is and compare that against its own vulnerabilities that could be used to compromise a network. While this was never an easy task, it is becoming much more difficult since the threats are evolving very rapidly and organizations are so complex. On day three students will understand the variety of tests that can be run against an organization and how to perform penetration testing in an effective manner. Finding basic vulnerabilities is easy, but it is not very effective if these are not the vulnerabilities that attackers will use to break into a system. Advanced penetration testing involves understanding the variety of systems and applications on a network and how they can be compromised by an attacker. Students will learn about both external and internal penetration testing and the methods of black, gray, and white box testing. Penetration testing is critical to identify an organization's exposure points, but students will also learn how to prioritize and fix these vulnerabilities to increase the overall security of an organization. CPE/CMU Credits: 6 Topics
|
||
| SEC501.4: First Responder | Eric Conrad |
Thu Nov 21st, 2013 9:00 AM - 5:00 PM |
OverviewAny organizations that are connected to the Internet or that have employees are going to have attacks launched against them. Even with a keen focus on robust network design, preventive security, and finding vulnerabilities through penetration testing, some attacks will still occur. In these cases identifying, analyzing, and responding is critical. Security professionals need to understand how to perform incident response, analyze what is occurring, and restore their organization back to a normal state as soon as possible. Day four will equip students with a proven six-step process to follow in response to an attack - prepare, identify, contain, eradicate, recover and learn from previous incidents. Cyber incidents are a lot like a fire. The sooner you detect them, the easier they are to deal with and the less damage they cause. Therefore prompt incident response is a key follow-on to intrusion analysis. Another key aspect of incident response is forensic analysis and discovery. Students will learn how to perform forensic investigation and find indication of an attack. This information will be fed into the incident response process and ensure the attack is prevented from occurring again in the future. CPE/CMU Credits: 6 Topics
|
||
| SEC501.5: Malware | Eric Conrad |
Fri Nov 22nd, 2013 9:00 AM - 5:00 PM |
OverviewAs security professionals continue to build more proactive security measures, attackers methods will continue to evolve. A common way for attackers to target, control, and break into as many systems as possible is through the use of malware. Therefore, it is critical that students understand what type of malware is currently available to attackers and future trends and methods of exploiting systems. With this knowledge students can then learn how to analyze, defend, and detect malware on systems and minimize the impact to the organization. CPE/CMU Credits: 6 Topics
|
||
| SEC501.6: Data Loss Prevention | Eric Conrad |
Sat Nov 23rd, 2013 9:00 AM - 5:00 PM |
OverviewCyber security is all about managing, controlling, and mitigating risk to your critical assets. In almost every organization, your critical assets are composed of data or information. Whether it is a customer list, research plans, intellectual property, classified information, or a marketing plan, this data represents the life line of your organization and must be properly protected. Perimeters are still important and critical, but we are moving away from a fortress model and moving towards a focus on data. This is based primarily on the fact that our networks are becoming more porous, and our data is more portable. Information no longer solely resides on your servers where properly configured access controls list can limit access and protect our information. The same intellectual property that is protected on a server behind a strong perimeter can now be copied to laptops (i.e. portable servers) and be plugged into networks (i.e. hotels, airports and coffee shops) that have no firewalls or security devices in place. This means the data must be able to be protected no matter where it resides, since a compromise of sensitive data will have an impact to the company, no matter how it was stolen. Building a strong perimeter defense is a critical first step, but focusing in on protecting and controlling critical data from loss is another key step in building a strong preventive measure. Proactive security must be put in place to make sure critical information is properly protected and exposure is minimized. CPE/CMU Credits: 6 Topics
|
||
| Additional Information | ||
| Laptop Required | ||
|
A properly configured laptop is required to participate in this course. Students must have Administrator privileges and antivirus software is not recommended and may need to be disabled or uninstalled. If you have a production system already installed that you cannot lose data on, it is recommended to obtain a clean hard drive, replace it with the new drive. Prior to the start of class, you must install the necessary software as described below. The following are minimal hardware requirements for your laptop:
Please note: Windows 7 32-bit is an explicit requirement for Sec501 and later versions of Windows operating systems will not work. VMware You will use VMware to simultaneously run multiple virtual machines when performing hands-on exercises. You must have VMware installed on your system. If you do not own VMware, you can download a free 30-day trial copy from the VMware website. If taking advantage of the trial offer, please make sure that the license will not expire before you complete the course. It is recommended that you use VMware Workstation. SIFT (SANS Incident Forensic Toolkit) In the labs we will utilize the SIFT Workstation to introduce the student to the SIFT Workstation and to teach hands-on response techniques. The SIFT Workstation was created and maintained by Rob Lee. Full instruction using the SIFT Workstation is accomplished in Forensics 508: Computer Forensic Investigations and Incident Response. Forensics 508 teaches how to respond to technically savvy criminals and challenging intrusion cases. You can download SIFT at: the SIFT Kit Download Page. Since the native Windows compression utility is unable to extract the SIFT main image file, you will need to download a compression utility. You can download WinRAR from the WinRAR website. To begin the installation, double-click the executable file and accept the default settings. Note that WinZip will also work. You will need to save the download to your local disk and use WinRAR to extract the files to the local disk and into the default path location. Once the Download is complete, launch VMware and find the folder SIFT Workstation v1.3. Within that directory you will find the Forensic Workstation .vmx file needed to launch SIFT. Open up the virtual image and download VMware Tools if prompted to. Additional Tools You Will Receive We will provide you with additional tools for completing hands-on exercises. Hardware requirements outlined above are meant to ensure that you have sufficient memory and disk space available to simultaneously run the SIFT Workstation virtual machine. The tools can also be downloaded from the Internet. For simplicity, you may want to create a folder on your desktop (e.g., 501 Day 4 Downloads) to use as a location for additional tools if you are downloading them from the Internet. Final Checklist We suggest going over the following checklist to make sure that your laptop is prepared for the course:
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
||
| You Will Be Able To | ||
|
||
| Paid by Oct 2 ‡ | Paid after Oct 2 ‡ | Options |
|---|---|---|
| €3,695 | €3,945 | |
|
||
