2023 live TRAINING classes

Course Name: Advanced Computer Networking Course

Format: 1-Day Class

Date(s): 10/5/2023

Training Time: 9-5 with one hour lunch

Trainer Bio: “Education is the passport to the future, for tomorrow belongs to those who prepare for it today.” Are you ready to prepare for the future of computer networking?

Hello, my name is Evan Gertis. I hold a Bachelor of Science degree in Physics from the University of North Carolina at Chapel Hill and a Master of Computer Science degree from the Allen E. Paulson College of Engineering at Georgia Southern University. As an entrepreneur and Ph.D. student, I am passionate about helping students gain a competitive edge through learning advanced computer networking topics.

Course Description: Knowledge is power. Information is liberating. Is it time for you to gain power through knowledge?

This intensive one-day course is designed to enhance participants’ understanding of computer networking through focused network security training. It will cover Reliable Data Transfer, the difference between UDP and TCP, and Cross-site Request Forgery. This course is geared towards students or individuals who aspire to work as network analysts or administrators.

Syllabus:

  • Introduction to Network Security
  • Reliable Data Transfer Principles and Practical Exercises
  • Understanding UDP and TCP Protocols, with Practical Exercises
  • Cross-Site Request Forgery (CSRF): Understanding and Prevention, with Practical Exercises
  • Course Review and Q&A Session

Target Audience: Anyone interested in improving their understanding of computer networking and network security.

Knowledge/Experience/Prerequisites: Ideally, students should have some basic understanding of networks. We will learn about TCP/IP, UDP, and CSRF attacks.

What attendees need to bring: It is suggested that participants bring a journal for note-taking and a computer for practical exercises.

Price: $229

Registration Deadline: 9/28/2023

REGISTER HERE


Course Name: Applied ICS Security Training

Format: 1-Day Class

Date(s): 10/5/2023

Training Time: 9-5 with one hour lunch and short breaks

Trainer Bio: David Formby is cofounder and CEO/CTO of Fortiphyd Logic. David received his Ph.D. in Electrical and Computer Engineering from Georgia Tech where he researched new attacks and defenses for industrial control system (ICS) networks. He now runs Fortiphyd Logic, which was started to commercialize his research on PLC endpoint detection and ICS simulations. He has disclosed several ICS vulnerabilities and regularly speaks at ICS-related events.

Course Description:  This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant and chemical reactor to learn about common ICS vulnerabilities and defenses. Participants will attack historians, HMIs, and PLCs to cause power outages and reactor explosions in the 3D simulation, and then implement defenses to harden the ICS.

In this session, attendees will learn:

  • A deeper understanding of common vulnerabilities in ICS networks and devices
  • Techniques for testing ICS devices for various vulnerabilities
  • Practical experience hardening ICS devices and networks

Topics Covered:

  • Scanning ICS networks
  • Sniffing Modbus, ENIP, and OPC UA traffic
  • Basic PLC and HMI programming
  • Using rogue masters to understand and manipulate the process
  • ICS network intrusion detection rules
  • PLC endpoint detection

Attendees will keep access to the online curriculum indefinitely and the online lab environment for 2 months following the training.

Target Audience: Beginner to intermediate professionals interested in industrial control systems.

Knowledge/Experience/Prerequisites: Some Linux experience is helpful but not necessary.

What attendees need to bring: Laptop with either Chrome or Firefox installed.

Price: $500

Registration Deadline: 9/28/2023

REGISTER HERE


Course Name:  Incident Response in AWS

Format: 2-Day Class

Date(s): 10/4 – 10/5/2023

Training Time: 8-5 with one hour lunch and two fifteen minute breaks (AM/PM)

Trainer Bio: Chris Farris is a highly experienced IT professional with a career spanning over 25 years. During this time, he has focused on various areas, including Linux, networking, and security. For the past eight years, he has been deeply involved in public-cloud and public-cloud security in media and entertainment, leveraging his expertise to build and evolve multiple cloud security programs. Chris is passionate about enabling the broader security team’s objectives of secure design, incident response, and vulnerability management. He has developed cloud security standards and baselines to provide risk-based guidance to development and operations teams. As a practitioner, he has architected and implemented numerous serverless and traditional cloud applications, focusing on deployment, security, operations, and financial modeling. He is one of the organizers of the fwd:cloudsec conference and presented at various AWS conferences and BSides events. Chris shares his insights on security and technology on social media platforms like Twitter, Mastodon, and his website https://www.chrisfarris.com.

Course Description: In this two-day course, you’ll experience in real-time a cloud incident and subsequent data breach, simulated in a vulnerable-by-design application. Students will act as our fictional company’s incident response team, and experience the various phases of the IR lifecycle. As an adversary compromises our simulated application we’ll cover detection, conduct a forensic investigation of the cloudTrail logs to determine what the attacker did, execute containment activities, and then perform an analysis to see if a data breach occurred. Students will then be let loose to track down a parallel incident and find the key indicators of cloud compromise in a CTF-like fashion.

The class is targeted toward SOC analysts and security engineers who are new to AWS and need a crash course in Cloudtrail, S3, IAM, serverless, and the many ways the public cloud changes the incident response process. Students need only a basic understanding of AWS and their laptops, as the entire cloud environment will be pre-built for our incident.

Target Audience: Security operations analysts, incident responders, security engineers & architects who want to experience an incident in AWS before it happens to them for real.

Knowledge/Experience/Prerequisites: The class is targeted toward SOC analysts and security engineers who are new to AWS and need a crash course in CloudTrail, S3, IAM, Serverless, and the many ways the public cloud changes the incident response process. This class doesn’t teach you to be an incident responder; it will teach an incident responder how to respond in AWS. Students need only a basic understanding of AWS and their laptops, as the entire cloud environment will be pre-built for our incident.

What attendees need to bring: Laptop with either Chrome or Firefox installed.

Price: $899

Registration Deadline: 9/27/2023

REGISTER HERE


Course Name: Security Onion 2.4 Fundamentals for Analysts and Administrators

Format: 4-Day Class

Date(s): 10/2 – 10/5/2023

Training Time: 8-5 with one hour lunch

Trainer Bio: Security Onion Solutions instructors have years of experience in threat hunting, enterprise security monitoring, and log management. They have worked in real-world operational security roles, engineered monitoring strategies and solutions, and handled real-world incidents. They bring their practical experience to the classroom, enabling students in both theory and hands-on application to hunt adversaries in environments large and small.

Course Description: This four-day course, our first covering Security Onion 2.4, is geared toward analysts and administrators of Security Onion. Students will gain a foundational understanding of this exciting platform – how to architect, deploy, and manage their Security Onion 2.4 grid. The course also covers major analyst workflows, reinforced through real-world case studies.

The class will cover the following topics:
● Security Onion Console
● Security Onion System Architecture
● Security Onion Workflows
__○ Alert Triage & Case Creation with SOC Alerts and Cases
__○ Threat Hunting with SOC Hunt and Dashboards
__○ Detection Engineering with Playbook
● Grid Management
__○ Users
__○ Firewalls
__○ Updating
__○ Monitoring
__○ Troubleshooting
● Tuning the Grid
__○ Berkeley Packet Filters
__○ Performance Tuning – Zeek and Suricata
__○ Data Pipeline Tuning – Curator, Logstash, and Elasticsearch
__○ Alert Tuning – Suricata and Playbook
● Integrating Endpoint Telemetry
● Managing Zeek
__○ Logs
__○ Scripts
● Multiple Labs and Case Studies

Target Audience: Users of Security Onion 2.4 – Analysts, Administrators, Security Engineers

Knowledge/Experience/Prerequisites: Security Onion Essentials HERE (2 hours; free) Students should have a basic understanding of networks, TCP/IP, and standard protocols such as DNS, HTTP, SSL, etc. Knowledge/experience with Linux is recommended, but not required.

What attendees need to bring: Laptops and coursebooks will be provided to students. Students may want to bring writing utensils to take notes in their course books.

Price: $3299

Registration Deadline: 9/22/2023

REGISTER HERE