About the course
This course takes on an “Attack Vs Detection” approach in a condensed format. It's a dedicated program for students who have a basic understanding of Linux OS and have to deal with advanced threats. Furthermore, the course is also dedicated to experienced DFIR/SOC/CERT members who aim to dig deeper into the understanding of Linux internals and corresponding attacks.
Through the hands-on labs, you will gain a perfect understanding of important DFIR Linux/Network internals and investigation steps needed to get the full picture of post-exploitation activities and artifacts left behind. At scale.
What you can expect:
Hands-on experience in the format of Attack-Detection-Response which is the basis for Detection Engineering
Coverage of many different open source security solutions for blue/DFIR teams vs many different tactics, techniques, and projects for the offensive side
We are going to explore and discuss many publicly available research and blog posts as well
-
The scope is huge:
from Linux in-memory process injections to memory forensics
from different C2 communications like Sliver/MSF to Zeek/Suricata on the network level and Falco/Tracee on the endpoint level
from web shells to Yara scanning
from yum persistence to auditd alerting
from LKM rootkits to LKRG prevention
from eBPF rootkits to eBPF detection ^^
and many more
Enjoy! :)