Anatomy of a Network Attack

Discover how how hackers exploit vulnerabilities to successfully launch their attacks

 

AVAILABLE ON CLIENT SITE OR AS A PUBLIC COURSE

Explore Attack Manifestations & Scenarios

Active Directory Based Attacks

DNS, APTs, LAN, DDos and DoS Attacks

Triage, Detection & Monitoring

Anatomy of a Network Attack

It is essential to train & educate your team on the most relevant network threats and how hackers exploit vulnerabilities to successfully launch their attacks.

This two day course is based on evidential information about cyber security attacks facing various organisations today. This course is based on our experience and interaction with our clients and other industry attack victims.  

This course is delivered by a heavily experienced senior leader and trainer. The trainer has extensive knowledge and expertise to manage and deliver a successful workshop and he has experience in dealing with different verticals. Collectively, CMA and its specially selected associates have an excellent track record of delivering engagements, small and large, supporting the Information Security and cyber incident management subjects. 

Prerequisites

All attendees should have basic understanding of information technology and must be able to understand the course content from a basic technology point of view.


Delegates will understand:

  • Review the current threat landscape and cover the common attack vectors hackers are exploiting.
  • Analyse recent known and some unknown attacks and dive into the technical details on how they avoided detection.
  • Review the basic application of incident triage, OODA and the Diamond Methodology and deep dive into the Cyber Kill Chain.
  • Help attendees understand the role log management plays in network based attacks followed by a review of the most common log types and log sources in an organisation.
  • Review most common SIEM products and technologies including security analytic approaches to SIEM.  We will also review NBAC – network behaviour anomaly detection approach to identifying attacks.
  • Deep dive into some of the most relevant attack scenarios – analysing each attack with a technical and business focus.
  • Help attendees understand the critical role that vulnerability management and penetration testing play in understanding network based attacks.
  • Produce a profile of attackers and their motivations, and their capabilities.
  • Identify and review results of current state of existing controls. This will include controls such as SIEM, Identity and access management, logging and monitoring and other relevant controls.
  New Call-to-action

Modules 

Triage, Detection & Monitoring

- OODA
Triage
Diamond Methodology
Logging
- SIEM
- Log Management
- Log Types
Deception Technology
- Visibility
Cyber Kill Chain

Attackers & Motivations

- Types of Attackers
- Privileges Insider
- Types of Attack motivations
- Impact of Actions
- Attack Vectors

Define Normal

Taxonomy
- Processes
- People 
- Technology

Attack Manifestation & Scenarios

Active Directory based attacks & the Privileged User
- LAN Based Attacks
- DDoS & DoS
- DNS
- Advanced Persistent Threats

Host Based Attacks
  • testimonial_img.png

    Most of the networking aspects I already knew quite well, but the security concepts and in particular your anecdotes and commentary were very useful. I think you did a great job.

    Network Engineer

    Wynard Group


"We have to understand what the adversery is doing in order to be able to start thinking about how the organisation should look to respond."
Amar Singh, CEO & Founder

Book your Anatomy of a Network Attack course. 

This course is available as internal training course delivered on client site or alternatively you can attend one of our public courses. Please fill in the form below and one of our team will get in touch to discuss your requirments. 

  • callOr call us on:
  • +44 (0) 203 189 1422