• Classroom
  • Online, Instructor-Led
Course Description

While there is undoubtedly a need for deep forensic analysis in the investigation of malware and operating system intrusions, an investigator has to know that there has been an intrusion before that activity can begin. Many organizations rely on technology to perform this task, but there is still no substitute for a well-trained analyst, when it comes to identifying and investigating abnormal behavior on a system.

Endpoint Live Forensics teaches students how to identify abnormal activity and investigate a running system that may have been compromised. In this course, students will learn the most useful commands, tools and techniques that can be employed during investigation to reveal the significant indicators of infiltration, as well as how to create a system baseline to be used for future analysis. This course is focused primarily on the Windows 10 and Linux operating systems.

Learning Objectives

  • Identify the core components of the operating system and certain a current state, using built-in or other trusted tools.
  • Analyze a running system and detect abnormal behavior relating to operating system components.
  • Use event log analysis to verify and correlate the artifacts of anomalous behavior and determine the scope of an intrusion.
  • Build or modify PowerShell scripts to Interrogate an operating system and automate repetitive analytic tasks.
  • Create and use a system baseline to identify unexpected items, such as rogue accounts or configuration changes.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.