This is a practical, hands-on course that provides incident analysis training through practical exercises and the basic knowledge required to perform duties as a security analyst.
We will together examine incident analysis methods from a practical perspective, necessary for corporate intrusion response and analysis tasks.
You will learn how to analyze the cause of security incidents.
You will learn about security solutions to counter cybersecurity threats.
You can practice the incident analysis process.
The pinnacle of professional security analyst practice! Learn how to analyze breach incidents through practice.
Basic competencies of a security analyst , Analysis of breach incidents!
💡 What is a breach?
According to Article 2, Paragraph 1, Subparagraph 7 of the Information and Communications Network Act, a “ breach incident ” means “an incident resulting from an attack on an information and communications network or information system related thereto by means of hacking, computer viruses, logic bombs, mail bombs, denial of service, or high-power electromagnetic waves.”
A breach incident that occurs in a system related to information assets refers to a case where abnormal operation occurs in the system or application , or a phenomenon (such as deletion, modification, or leakage) unintended by the administrator is caused by an attacker .
When a cyberattack occurs, companies must quickly determine the extent of damage and minimize the business impact through accident recovery. If activities required to comply with laws or regulations required by the industry are omitted, penalties or additional compliance items may be imposed according to related laws or regulations. In order to minimize the business impact, companies focus on responding to incidents across the company, including the security team, public relations team, and legal team. Companies conduct annual or quarterly training through mock drills on the essential activities required to respond when a security incident occurs.
Security analysts perform incident analysis work when a breach occurs in a company or organization or legal issues arise. In order to identify the cause of system abnormalities that occur due to various causes, the ability to distinguish these problem situations is necessary. In particular, when a breach occurs due to an external intrusion or internal employee intrusion, the role of a security analyst is to analyze the damage to the system and the cause of the breach through incident analysis.
In order to analyze the damage caused by a company's accident and to devise countermeasures to prevent accidents from recurring, it is most important to analyze the exact cause of the accident. However, it is very rare and difficult to actually experience the accident analysis process.
The term “Big Root” is commonly used to emphasize the complexity of a problem or situation. “Big Root” means that the root of the problem is large and complex. This indicates that the problem is not limited to a single cause or factor, but rather is a complex intertwining of various factors .
In the case of breaches due to advanced cyberattacks, it is also difficult to resolve the cause of the incident through system analysis that is revealed on the surface. Advanced attacks cause repeated recurrence of incidents and cause continuous damage to the company's business. The corporate security team must check information on various systems and solutions during the analysis process to identify the root cause and vector of the security incident.
Through lectures, you will learn about the security incident response procedures and the types and causes of cybersecurity incidents that cause serious damage to companies. You will learn the capabilities necessary to fundamentally resolve security vulnerabilities that cause hacking incidents.
From concept to practice The basics of breach analysis.
Through training in breach analysis similar to real-world cases, You can develop your accident analysis skills.
Gain the basic knowledge needed to perform your job as a security analyst and practice using analysis tools.
Identify the causes of cybersecurity incidents based on an understanding of network communications and applications.
By analyzing threat logs generated from various security devices, you can identify attackers attempting intrusion.
Learn practical breach incident analysis methods required for performing corporate intrusion response and analysis work.
In this lecture, we will look at the practical perspective of breach incident analysis methods required for performing intrusion response and analysis work in companies . We will provide practitioners performing network-based intrusion detection log or network packet analysis work with the knowledge and know-how of handling analysis tools required by security analysts for analysis, and explain what results should be found through analysis.
In particular, when performing security analysis work, you will use various logs and analysis tools. For those who want to analyze intrusion detection system logs, web server logs, and network packets, I would like to explain the basic concepts and practical techniques of threat analysis. By explaining the basic concepts and techniques as well as the know-how the author acquired from his work, I hope to help students improve their work performance capabilities.
The information analyzed for incident analysis typically includes web logs, IDS/IPS logs, and network packet logs. We plan to conduct incident response training while analyzing logs from systems where actual security incidents occurred. Finally, we will share how to take your career in the future from the perspective of career management.
Efficient analysis learning I'll help you.
Intrusion Response/Analysis Required for practical use How we collect information
Breach response/analysis Used by practitioners Analysis Tools and Usage
Breach response/analysis By way of example Practical know-how
1) Learn the analytical tools and methods used by breach response/analysis practitioners.
If you do not have much experience in analyzing breaches, you may be at a loss as to where to start when investigating an incident. In this lecture, you will practice cases of each type of incident so that analysts can quickly find the cause of the incident and identify the attack path. Through the practice, you will learn what to focus on and how to analyze efficiently to find traces of the breach when analyzing security logs.
✅ Learning about normal log classification criteria cases
✅ Practice using a bulk log analysis program
✅ Learning about breach incident types
2) It can be applied and utilized in various situations through analysis methods that are not dependent on hacking techniques.
Attackers attempt to infiltrate systems in a variety of ways. By understanding the principles of exploiting vulnerabilities without being tied to specific attack tools or attack methods, you can perform analysis by applying them to various security attack attempts.
Security Analysis Practice for Training.
IDS Log Analysis Training
We provide some filtered attack logs detected by commercial security products for practice. The attack event name, attack time, and other information are configured identically to actual incident cases.
Web Log Analysis Training
We directly analyze the attack techniques targeting web servers and the logs left on the target server. Through analysis, we identify vulnerable settings on the web server and identify the cause of the accident.
Network Packet Analysis
We reproduced a cybersecurity incident case under the same conditions in a lab environment, reproduced the process of attacking the system from the attacker's perspective, and captured network traffic. We analyzed the captured packets to analyze the attack target and the scope of damage.
📣 Please check before taking the class!
In the logs used for the exercise, the attacker IP and target IP are redacted for the exercise.
What you'll learn 📚
You can learn the analysis process by practicing breach analysis through each practical case study. Before learning through the analysis process, you will first perform the analysis yourself and compare the process you analyzed yourself with the contents of the analysis guide.
Section 1 - Pre-study
Before the practical training, we will look at the methodology required for analysis. We will learn how to analyze by dividing it into a method of identifying attack behaviors based on specific patterns and a method of setting thresholds and identifying threats based on behaviors. Then, we will look at how to apply it to security incident cases through an example of identifying abnormal behaviors in a movie.
Reference video for identifying unusual behavior in movies (click)
Analyze the causes of large-scale network failures by analyzing intrusion detection solution events detected over a certain period of time. The following table shows intrusion detection events extracted from the intrusion detection system.
Detection Items
Detection information
Event collection period
3months
Detection signature name
TCP_Invalid_SACK
OriginIP
10.0.0.1
Departure port
Random
DestinationIP
Random
Destination Port
Random
Total
1441cases
The intrusion detection system signature called TCP_Invalid_SACK is caused by abnormal SYN packets and ACK packets. Normally, TCP communication sends and receives necessary communication packets in a method specified by the protocol. However, depending on the program or network characteristics used for communication, a phenomenon occurs in which communication is performed in a different way from the specified protocol. The TCP_Invalid_SACK signature records this phenomenon.
For this reason, even when an attacker uses a non-standard program, the communication history is detected. Of course, the detected information does not only record the attacker's communication. The number of times the attacker communicated in the 1441 detected events is likely to be a small number. Security analysts should find a small number of attack detections through event analysis.
The cause of the accident is traced through the process of analyzing the practice log file directly. The analysis results for the cause of the accident are explained in the analysis guide section. As emphasized above, you will first analyze the accident analysis process yourself and compare it with the contents of the analysis guide section and perform accident analysis training.
We analyze the accidental circumstances of the system where the intrusion occurred through web log analysis. The log processing work is to remove unanalyzed or unnecessary information to analyze the event more efficiently. However, such traffic is innumerable like a haystack. Finding the attack traffic like a needle hidden in the haystack is never easy.
In the second lab, we will look at how to clear the straw using web logs. Let's install Splunk, Log Parser, and Elasticsearch and practice the Windows web server log analysis process.
Attackers who bypass file extension restrictions upload application executable files (ASP extension files) to the bulletin board and take control of the system. Let's analyze a web shell attack that is carried out through network communication. The packet analysis process allows for a fairly efficient intrusion analysis by simply selecting the analysis scope of the target communication or server to be analyzed. In order to analyze web shell communication packets, we will efficiently analyze packets by utilizing filter statements used during analysis.
During the analysis process, let's extract the backdoor file that was executed through actual network communication and trace through reproduction what communication took place and what damage was done to the server.
Q&A 💬
Q. What prerequisite knowledge is required to learn?
This course is mainly composed of hands-on exercises. It does not include basic concepts or theories of cyber security. To perform the exercises in this course, you need to understand IDS, web application settings, and web server response codes. Although prior knowledge is required, you can analyze breach incidents even if you have never hacked before.
Q. How is it different from other security lectures?
The lecture content is organized around practical experience in security incident analysis techniques and know-how. All three breach incident analysis cases are based on actual incident cases, so they can improve your security incident analysis experience. However, the legal meaning of collecting disk images will not be covered in the forensic process.
Q. Are there any notes regarding course registration?
The training uses public tools (MS Log Parser Studio, Wireshark), free trial security products, and Microsoft EXCEL. The training content omits the process of installing the analysis product. Students must individually install the product by referring to the installation guide link of each product manufacturer.
The knowledge sharer for this course is ✒️
Bigroot Security
I have been working as a CERT team breach response specialist and a solution engineer for a foreign security company for 18 years. I was in charge of SOC construction project and operation project PM at IBM Korea. I performed work on designing security infrastructure and developing construction/operation process. I performed security breach analysis & response work for private companies and public institutions at AhnLab CERT team. When the 3.20 DarkSeoul campaign occurred, I performed inspection of domestic broadcasting company systems and supported inspection of the leaked system at the time of the Nate personal information leak incident.
Key career highlights
Security Consultant: Design/build/operate security enhancement strategies through security infrastructure consulting
Security Control Consulting: SOC construction consulting and operation work
Security Service Product Development: Development of Next-Generation Security Control Solutions & Services
Response to breach incidents: Military/public/private companies, etc.
Hacking, Intrusion Incident Analysis (G&S, 2009: (2009 Ministry of Culture, Sports and Tourism Outstanding Academic Book)
Recommended for these people
Who is this course right for?
SOC Security Analyst
Corporate IT Security Officer
Security Incident Response Team (Blue Team)
Security monitoring personnel
Security Consultant
Other Incident Response Analysts
Need to know before starting?
Basic understanding of cyber security
Understanding of IDS and Web Application Settings, Web Server Response Codes
Hello This is
459
Learners
40
Reviews
4.7
Rating
1
Course
CERT팀 침해사고대응전문가와 외국계 보안 기업의 솔루션 엔지니어로 18년째 활동 하고 있습니다.
한국 IBM 에서 SOC 구축 프로젝트와 운영 프로젝트 PM을 담당 했습니다. 보안 인프라에 대한 설계와 구축/운영 프로세스 개발 업무를 수행했습니다.
시스코(CISCO) 코리아에서 보안 솔루션에 대한 기술 전문가로서 보안 아키텍처 구성 및 위협 대응 사례에 대한 지식을 갖춘 전문가로 고객 현황 진단 및 개선을 조언 하였습니다.
안랩 CERT팀에서 민간기업과 공공기관의 보안 침해사고 분석&대응 업무를 수행 했습니다. 3.20 다크서울(DarkSeoul) 캠페인 발생 당시 국내 방송사 시스템 점검을 수행했으며, 네이트 개인정보 유출사건 당시 사고 유출 시스템에 대한 점검을 지원 하였습니다. 민간 기업 및 공공 기업을 대상으로 발생한 다양한 침해사고 조사 업무를 수행했습니다.