No Class on December 24 or 31.
If you have an inkling of awareness of security (even my elderly aunt knows about the perils of the Interweb!), you often hear the disconcerting news about another high-profile company getting compromised. The security landscape is continually changing from what was once only perimeter protection to a current exposure of always-connected and often-vulnerable. Along with this is a great demand for security savvy employees who can help to detect and prevent intrusions. That is our goal in the Intrusion Detection In-Depth course - to acquaint you with the core knowledge, tools, and techniques to prepare you to defend your networks.
This track spans a wide variety of topics from foundational material such as TCP/IP to detecting an intrusion, building in breadth and depth along the way. It's kind of like the "soup to nuts" or bits to bytes to packets to flow of traffic analysis.
Hands-on exercises supplement the course book material, allowing you to transfer the knowledge in your head to your keyboard using the Packetrix VMware distribution created by industry practitioner and SANS instructor Mike Poor. As the Packetrix name implies, the distribution contains many of the tricks of the trade to perform packet and traffic analysis. All exercises have two different approaches. A more basic one that assists you by giving hints for answering the questions. Students who feel that they would like more guidance can use this approach. The second approach provides no hints, permitting a student who may already know the material or who has quickly mastered new material a more challenging experience. Additionally, there is an "extra credit" stumper question for each exercise intended to challenge the most advanced student.
By week's end, your head should be overflowing with newly gained knowledge and skills; and your luggage should be swollen with course book material that didn't quite get absorbed into your brain during this intense week of learning. This track will enable you to "hit the ground running" once returning to a live environment.
This is a fast-paced track, and students are expected to have a basic working knowledge of TCP/IP (see www.sans.org/conference/tcpip_quiz.php ) in order to fully understand the topics that will be discussed. Although others may benefit from this course, it is most appropriate for students who are or who will become intrusion detection/prevention analysts. Students generally range from novices with some TCP/IP background all the way to seasoned analysts. The challenging hands-on exercises are specially designed to be valuable for all experience levels. The Packetrix VMware used in class is a Linux distribution so we strongly recommend that you spend some time before attending becoming familiar with a Linux environment that uses the command line for entry.
Sampling of Topics:
Fundamentals of traffic analysis
Traffic analysis tools
Theory and hands-on usage of Snort
Network Forensics
Traffic correlation
| Course Contents | ||
|---|---|---|
| SEC503.1: Fundamentals of Traffic Analysis: Part I | ||
OverviewDay 1 provides a refresher or introduction, depending on your background, to TCP/IP covering the essential foundations such as the TCP/IP communication model, theory of bits, bytes, binary and hexadecimal, an introduction to Wireshark, the IP layer, both IPv4 and IPv6 and packet fragmentation in both. We describe the layers and analyze traffic not just in theory and function, but from the perspective of an attacker and defender. All traffic is discussed and displayed using the two open source tools Wireshark and tcpdump. Students can follow along with the instructor viewing the sample traffic capture files supplied. Six hands-on exercises, one after each major topic, offer you the opportunity to reinforce what you just learned. CPE/CMU Credits: 6 TopicsConcepts of TCP/IP
Introduction to Wireshark
Network access/link layer
IP Layer
|
||
| SEC503.2: Fundamentals of Traffic Analysis: Part II | ||
OverviewDay 2 continues where Day1 ended in understanding TCP/IP. Two essential tools - Wireshark and tcpdump are explored to give you the skills to analyze your own traffic. The focus of these tools on Day 2 is filtering traffic of interest in Wireshark using display filters and in tcpdump using Berkeley Packet Filters. We proceed with our exploration of the TCP/IP layers covering TCP, UDP, and ICMP. Once again, we describe the layers and analyze traffic not just in theory and function, but from the perspective of an attacker and defender. All traffic is discussed and displayed using the two open source tools Wireshark and tcpdump. Students can follow along with the instructor viewing the sample traffic capture files supplied. Four hands-on exercises, one after each major topic, offer you the opportunity to reinforce what you just learned. Note: This course is available to Security 503 participants only. CPE/CMU Credits: 6 TopicsWireshark display filters
Writing tcpdump filters
TCP
UDP
ICMP
|
||
| SEC503.3: Application Protocols and Traffic Analysis | ||
OverviewDay 3 culminates the examination of TCP/IP with an exploration of the application protocol layer. The concentration is on some of the most widely used, and sometimes vulnerable, crucial application protocols - HTTP, SMTP, DNS, and Microsoft communications. Our focus is on traffic analysis, a key skill in intrusion detection. We'll take a brief foray into packet crafting and nmap remote OS identification so that you can analyze and recognize telltale signs of each. Packet crafting is a handy skill for an analyst to possess, especially for testing IDS/IPS rules. IDS/IPS evasions are the bane of the analyst so the theory and possible implications of evasions at different protocol layers are examined. The day concludes with examination and analysis of some real world traffic captures. Once again, we describe the applications not just in theory and function, but from the perspective of an attacker and defender. All traffic is discussed and displayed using the two open source tools Wireshark and tcpdump. Students can follow along with the instructor viewing the sample traffic capture files supplied. Four hands-on exercises, one after each major topic, offer you the opportunity to reinforce what you just learned. Note: This course is available to Security 503 participants only. CPE/CMU Credits: 6 TopicsAdvanced Wireshark
Detection methods for application protocols
Microsoft Protocols
HTTP
SMTP
DNS
Packet crafting and nmap OS identification
IDS/IPS evasion theory
Real world traffic analysis
|
||
| SEC503.4: Intrusion Detection Snort Style | ||
OverviewThe fundamental knowledge gained from the first three days provides a fluid progression into one of the most popular days - Intrusion Detection: Snort Style. Snort is a widely deployed open source IDS/IPS that has been a standard in the industry for over a decade. Knowing how to configure, tune and use it are indispensable skills. Some of the day's topics are how to run Snort, its modes of operations, configuration options, deployment types, dealing with false positives and negatives, writing rules and using different Snort GUIs and sensor management. Hands-on exercises allow you to run Snort in different modes and give you the opportunity to write an advanced Snort rule and test it. Note: This course is available to Security 503 participants only. CPE/CMU Credits: 6 TopicsIntroduction
Modes of operation
Writing Snort rules
Configuring Snort as an IDS
Miscellaneous
Snort GUIs and analysis |
||
| SEC503.5: Network Traffic Forensics and Monitoring | ||
OverviewOn the penultimate day, you'll become familiar with other tools in the "analyst toolkit" to enhance your analysis skills and give you alternative perspectives of traffic. The open source network flow tool SiLK is introduced. It offers the capability to summarize network flows to assist in anomaly detection and retrospective analysis, especially at sites where the volume is so prohibitively large that full packet captures cannot be retained for very long, if at all. The topic of network forensics is examined to show you how to investigate an incident using multiple approaches including log analysis. Finally, you can see how your forensic data can be correlated and analyzed by open source tools, with a concentration on the OSSEC that acts as a host-based IDS and Security Information and Event Manager (SIEM). Four hands-on exercises, one after each major topic, offer you the opportunity to reinforce what you just learned. Note: This course is available to Security 503 participants only. CPE/CMU Credits: 6 TopicsAnalyst toolkit
SiLK
Network Forensics
Network architecture for monitoring
Correlation of indicators
|
||
| SEC503.6: IDS Challenge | ||
OverviewThe week culminates with a fun hands-on Challenge where you find and analyze traffic to a vulnerable honeynet host using many of the same tools you mastered during the week. Students can work alone or in groups with or without workbook guidance. This is a great way to end the week since it reinforces what you've learned by challenging you to think analytically, gives you a sense of accomplishment, and strengthens your confidence to employ what you've learned in the Intrusion Detection In-Depth track in a real world environment. Note: This course is available to Security 503 participants only. CPE/CMU Credits: 6 |
||
| Schedule | Instructor | |
|
Tue Nov 19th, 2013 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Nov 26th, 2013 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Dec 3rd, 2013 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Dec 10th, 2013 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Dec 17th, 2013 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Jan 7th, 2014 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Jan 14th, 2014 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Jan 21st, 2014 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Jan 28th, 2014 6:30 PM - 8:30 PM |
David Mashburn | |
|
Tue Feb 4th, 2014 6:30 PM - 8:30 PM |
David Mashburn | |
| Additional Information | ||
| Laptop Required | ||
|
LAPTOP REQUIRED IMPORTANT - BRING YOUR OWN LAPTOP You will need to run a Linux VMware image, supplied at the conference, on your laptop for the hands-on exercises that will be performed in class. Some familiarity and comfort with Linux and entering commands via the command line will facilitate your experience with the hands-on exercises. VMware VMware Player or VMware Workstation is required for the class. If you plan to use a Macintosh, please make sure you bring VMware Fusion. You must have either the free VMware Player 3 or later or the commercial VMware Workstation 6 or later installed on your system prior to coming to class. You can download VMware Player for free at www.vmware.com. Alternatively, if you want a more flexible and configurable tool, you can download a free 30-day trial copy of VMware Workstation from www.vmware.com. VMware will send you a time-limited license number for VMware Workstation if you register for the trial at their Web site. No license number is required for VMware Player. Macintosh users must have VMware Fusion 3 or later installed on your system prior to coming to class. It is available for a free 30-day trial copy at www.vmware.com/products.fusion/overview.html. Mandatory Laptop Hardware Requirements
Do not bring a laptop with sensitive data stored on it. SANS is not responsible if your laptop is stolen or compromised. By bringing the right equipment and preparing in advance, you can maximize what you'll see and learn as well as have a lot of fun. If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
||
| Who Should Attend | ||
|
||
| Prerequisites | ||
Students must possess at least a working knowledge of TCP/IP and hexadecimal. To test your knowledge, see our TCP/IP & Hex Quizzes at www.sans.org/conference/tcpip_quiz.php. |
||
| You Will Be Able To | ||
|
||
| Paid by Oct 22 | Paid by Nov 5 | Paid after Nov 5 | Options |
|---|---|---|---|
| $3,450 | $3,700 | $3,950 | |
|
|||