Ideal Candidates for Cloud Leak Exercise - Cyber Range Class
Beginner, Intermediate, and Expert Cyber Security Analyst wishing to update their hands-on skills.
Cloud Leak Exercise - Cyber Range Prerequisites
Experience in the following areas: Windows 2008 R2, Windows 10, OPNsense, Security Onion, VyOS and Exchange 2010.
What You'll Get in Cloud Leak Exercise - Cyber Range
What You'll Learn in Cloud Leak Exercise - Cyber Range
Participants will learn how to:• Identify techniques used to compromise cloud and othernetwork services.• Determine the extent of a network intrusion campaign.• Capture, preserve and recover network and host-basedartifacts from an attack on cloud storage.• Identify the steps needed to secure a cloud storage site andthe enterprise network following intrusion.• Document and report the source and extent of acompromise along with recommendations for hardening thenetwork against attack and better data hygiene practices.
No Certification Test Available For This Course
No Certification Test Available For This Course
Cloud Leak Exercise - Cyber Range Outline
Phase 1 – Cloud Storage Investigation: Participants will be introduced to the environment, and the potential threat posed by the adversary. They will work to capture and preserve artifacts from an attack on a cloud storage service. This information will be used to determine the origin and extent of the attack.
Phase 1 Objectives:
•Identify method(s) used to compromise the cloud storage service.
•Extract tools and files left behind by the attacker if possible.
•Identify the types and locations of data potentially compromised in the attack.Phase 2 – Enterprise Network Compromise Investigation: Participants will use tools to capture, preserve and recover network and host-based artifacts from the attack to determine if/how the enterprise network was compromised as part of this attack. The information obtained during this phase should provide a clear picture of how the adversary attempted/successfully pivoted from the cloud storage site to the enterprise network.
Phase 2 Objectives:
•Identify all systems compromised in the attack.
•Identify the methods used to compromise each affected system.
•Identify tools used to compromise the network.
•Extract samples of tools or malware left on the network if possible.
•Identify any persistent adversary activity in the network.Phase 3 – Briefing of Findings: Participants will be given time to integrate the evidence gathered in Phase 1 and Phase 2 and compose a detailed report of the attack, which will then be briefed to the larger group. This report should address the objectives listed below.
Phase 3 Objectives:
•Provide a description of how the attacker was able to gain access to the cloud storage site.
•Identify the types of data compromised in the attack.
•Provide specific instructions to recover from the compromise.
•Provide recommendations for organization-wide changes that would limit the impact of future compromises of cloud storage.Phase 4 – Hot Wash: A Red Team member provides the “Attacker Point of View” detailing the different methods used in the attack to encourage discussion about what might have been missed and what can be learned and improved upon. Phase 4 Objectives:
•Discuss ways to better identify and protect against this type of attack.
•Relate the lessons learned to what can be implemented within the institution’s own environments.
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.