Security + Cloud + Machine Learning For Security Engineers
We can’t talk about security without mentioning cloud and machine learning any more. The current challenge the security industry faces is coming from the fact that there are too much of data to process to find anomalies in the systems and networks. Using human analysts to defend your network against hackers are not a viable option anymore. First, there are not enough human talents out there. Second, by nature, human analysts are not efficient in ROI perspective. Machine learning is not a good-to-have tool for security operation, it is a must-have.
This training course will give you a good idea about how the typical machine learning model building process looks like. Good model comes from good data and good data come from good sensors. We will focus on the sensors in the beginning and move on to the heuristic detections over the collected telemetry. Finally, we will discuss usual method to build solid machine learning model upon collected data. This course will provide POC level starting point for your corporate’s machine learning project or can give inspirations on how you can apply the methodology to your problem domain.
Understanding on the current threat landscape/APT vs Commodity Malware/PE vs Non-PE/Living-off-the-land Attacks/MITRE ATT&CK Matrix
12:00
13:30
Lunch
Group Lunch
13:30
17:00
Exercise
Living Off The Land Attack vs Detection Modeling
Day 2 - Sensors - Windows Events/Telemetry Collection/Event Hunting
Objectives:
Understand methods for collecting Windows Events
Hunt useful Windows Events
Learn using basic Windows Events tools (focusing on PowerShell cmdlets)
Start
End
Name
Description
10:00
10:50
Windows Events
Windows Events - concepts and tools
11:00
11:50
Advanced Windows Events
PowerShell/WMI/Sysmon/AMSI
12:00
13:30
Lunch
Group Lunch
13:30
17:00
Exercise
Events Investigations: setup sysmon/winlogbeat, investigate malware activities based upon Windows Events, understanding sysmon/PowerShell/WMI/kernel events