- This event has passed.
FloCon 2022: Intrusion Analysis & Threat Hunting with Open Source Tools
January 11, 2022 @ 1:00 pm - 4:00 pm EST
FloCon 2022 – Instructed by Dr. Josh Stroschein & Peter Manev!
Limited spots available on Day 1 & Day 2:
Track III: Intrusion Analysis & Threat Hunting with Open Source Tools (Day 1)
Track III: Intrusion Analysis & Threat Hunting with Open Source Tools (Day 2)
Click here to register for FloCon 2022 on Eventbrite
Click here to view the FloCon landing page
Find instructor information & course info here
In today’s threat landscape, sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. In Intrusion Analysis and Threat Hunting with Open Source Tools, you will learn how to dig deep into network traffic to identify key evidence that a compromise has occurred, learn how to deal with new forms of attack, and develop the skills necessary to proactively search for evidence of new breaches. We will explore key phases of adversary tactics and techniques – from delivery mechanisms to post-infection traffic – to get hands-on analysis experience. Open-source tools such as Suricata and Moloch will be utilized to generate data, perform exhaustive traffic analysis, and develop comprehensive threat hunting strategies. By the end of this workshop, you will have the knowledge and skills necessary to discover new threats in your network.
To help you prepare for this workshop, we recommend that you are familiar with the basics of network security monitoring, IDS/IPS systems and Linux environments. Familiarization with IDS rules is recommended, but not required. We also recommend the following readings:
- MITRE Attack Design and Philosophy by Blake Strom, et al
- The Diamond Model of Intrusion Analysis by Sergio Caltagirone, et al
- Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Eric Hutchins, et al