RSA NetWitness Endpoint Analysis

Document created by Elizabeth Maloney Employee on Jul 25, 2016Last modified by Elizabeth Maloney Employee on May 1, 2017
Version 11Show Document
  • View in full screen mode

ScheduleandRegisterButton

ScheduleOnlyButton

 

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

 

 

Summary

This in-depth, classroombased experience enables RSA NetWitness Endpoint security analysts to use all major facets of the Netwitness Endpoint toolkit to identify malicious software and activity.

 

Overview

This instructor-led classroom-based course provides core essentials training for security analysts employing RSA NetWitness Endpoint. Students participate in an interactive lecture format and put into practice what they learn in instructor-assisted hands-on lab work in an live deployment.

 

Audience

 

This RSA NetWitness Endpoint training is intended as the core of Tier One security analysts or the fundamental knowledge required by experienced security analysts new to the tool.


Delivery Type
Classroom


Duration
2 days

 

Prerequisite Knowledge/Skills

Students should have familiarity with the basic processes of security forensic analysis Students should have completed the following courses (or have equivalent knowledge) prior to taking this training:

 

Learning Objectives
Upon successful completion of this course, participants should be able to:

  • Schedule scans using machine groups
  • Interpret scan results based on Module and Machine context
  • Consider advanced threats employing key Windows executables and processes
  • Build a simple attack/intrusion timeline to further chronology-based investigation
  • Create a Yara signature based on a real-world Trojan.

 

Course Outline

  • Module 1 – Introduction
    • Expectations
    • Need for Context
    • Ransomware Example
  • Module 2 –Workflows
    • Typical Roles
    • Level 1: Baseline and escalation
    • Level 2: Complete Analysis
    • Level 3: Malware forensics
    • Typical alert responses
  • Module 3 –Endpoint Scans
    • Organize by Machine Group
    • Scan parameters:
      1. Threat ratings
      2. Periodicity
      3. Basic vs. Full Scans
    • Results details
      1. Summary
      2. Downloaded
      3. Agent log
      4. Scan data
      5. More info
  • Module 4 – The Module  Analysis Toolkit
    • IIOCs
    • Module Filters
    • External resources
  • Module 5 – Module Context
    • Module location
    • Proliferation (machine count)
    • File names
    • IOC combinations
    • Building a timeline
  • Module 6 – Windows Entities for Security Analysts
    • svchost.exe
    • lsass.exe
    • msiexec.exe
    • wmiPrvSE.exe
    • conhost.exe
    • Webshells
    • Mimikatz.exe
  • Module 7 – Tracking systems
    • Threat assessment
    • Signatures and recognition
    • Characteristics and behavior
    • Context
  • Module 8 – Yara
    • Purpose
    • Mechanics
    • Status
    • Rule Creation and Modification
    • Yara Rule Sources
    • Extract Signature from Trojan
    • Demonstration & Lab
  • Module 9 – Basic module forensics
    • Forensics
      toolkit in RSA NetWitness Endpoint
    • Other
      forensics tools
    • Demonstration
      & Lab

 

 

 

ScheduleandRegisterButton

ScheduleOnlyButton

 

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

Attachments

    Outcomes