Curso SentinelOne Incident Responder
16 horasVisão Geral
Este Curso SentinelOne Incident Responder, fornece o conhecimento e as habilidades necessárias para usar efetivamente a plataforma SentinelOne para identificar e responder a incidentes.
Objetivo
Ao participar do Curso SentinelOne Incident Responder, os participantes aprenderão a:
- Obtenha uma forte compreensão do console SentinelOne
- Funcionalidade de filtragem
- Funcionalidade de pesquisa
- Análise de ameaças
- Fluxo de trabalho de mitigação e resolução
- Gerenciando a lista negra
- Gerenciando exclusões
- Gerenciamento de riscos de aplicativos
- Shell Remoto
- Visibilidade Profunda
- Trabalhando com relatórios
- Caça a ameaças de infravermelho
Publico Alvo
- Analistas de segurança
- Operações de segurança
- Arquitetos de segurança
Pre-Requisitos
- Compreensão de redes e segurança de rede
- Compreensão dos conceitos fundamentais de segurança da informação
- Familiarize-se com o ambiente Microsoft Windows
Materiais
Inglês + Exercícios + Lab PraticoConteúdo Programatico
Introduction
- What is SentinelOne
- SentinelOne Versions
- SentinelOne Strengths
- Underlying Technology
- SentinelOne Ranger
- SentinelOne Vigilance
- SentinelOne Resources
S1 Capabilities and Management Console Overview
- Getting Logged in
- AI Engines
- Automatic/Manual Response
- Endpoint Firewall
- Device Control
- Incident Response
- Threat Hunting
- Ranger
- Application Risk Management
- Activity
- Reports
- Dashboard
- Settings
SentinelOne Investigator
- Getting Logged in
- AI Engines Explained
- Remediating Simple Malware
- Review incident
- Explore Incident
- Kill and quarantine
- Black list
- Un-Quarantine
- Exceptions
- Story line
- Remediation
- Remediating Ransomware
- Review incident
- Explain Rollback
- Device Control
- Firewall Control Managing Blacklists
- Managing Exclusions
- Hash
- Path
- Signer Identity
- File Type
- Browser
- Analyzing Threats
- Threat Management
- Mitigation Actions
- On-Demand File Fetch
- Full Disk Scan
- Management Console Dashboard
- Working with Widgets
- Application Risk Management
- Remote Shell
Introduction to Regular Expressions
- What is a Regular Expression?
- Literals vs. Operators
- RegEx Syntax
- Escape Characters
- Or Operators
- Sets
- Repetition Operators
- Metacharacters
- Character Classes
- Pattern Anchors
- Capturing & Non-Capturing Groups
Ranger Administration
- Understanding Deep Visibility
- How to Use Deep Visibility
- Threat Hunting Query
- Take Action from the Visibility Page
- Deep Visibility Query Syntax
- Deep Visibility Use Cases
- Hunting Abnormal Behavior on an Endpoint
- Responding to Incidents with Deep Visibility
- Configuring Deep Visibility Data Collection
- Saving Threat Hunting Queries and Watchlists
- Working with Saved Deep Visibility Queries
- Query with Custom Time Range
- Managing the Browser Extension
- Supported File Types for Deep Visibility
Mindset of a Threat Hunte
- EC Council's 17 Phases
- What is Threat Hunting
- What a Blue Team does and which skills to take away from Blue Team experience
- What a Red Team does and which skills to take away from Red Team experience
- Intel
- Intel the process
- Intel the product
- ATT&CK MITRE
- Common Vocabulary
- Behaviors > Indicators
- Paranoia
- The cycle of thought that drives threat hunting
- Supported File Types for Deep Visibility
Hunting, Not Searching
- Difference between searching and hunting
- Knowing when searching is OK
- Building better hunts
- Postulating
- Creating and testing an attack hypothesis
- IOCs, TTPs and Storyline
Advanced IR
- Techniques
- S1QL
- Watchlists/WAR
- Hunter Extension
- Hermes
- SIEM/SOAR
- Remote Shell
- Scripting and Remote Execution
- Architecture
- Execution
- Reporting
Threat Hunting with SentinelOne
- Containment and Acquisition
- Network Quarantine
- File Fetch
- Alerts
- Incident Threats Page
- Notes
- MITRE Mapping
- Deep Visibility
- Storyline
- 30 days of Event Data
- Remote Shell
- Using other Forensic Kits (Scripts)
- Issuing WMI Commands
- "Mark as Threat" Workflow
- Rollback
- Remediation
- Device Control
- Firewall Orchestration
- Group Policies
- API
Ranger Monitoring
- Recognizing rogue systems
- Categorizing unknown systems
- Understanding search results