OffSec SOC-200 (OSDA)
OffSec SOC-200 (OSDA)
OffSec SOC-200 (OSDA)
Course Description
Learn the foundations of cybersecurity defense with Foundational Security Operations and Defensive Analysis
(SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat
Hunters. Learners gain hands-on experience with a SIEM, identifying and assessing a variety of live, end-to-end
attacks against a number of different network architectures. Learners who complete the course and pass the
exam earn the OffSec Defense Analyst (OSDA) certification, demonstrating their ability to detect and assess
security incidents.
Objectives
Recognize common methodologies for end-to-end attack chains (MITRE ATT&CK® framework)
Conduct guided audits of compromised systems across multiple operating systems
Use a SIEM to identify and assess an attack as it unfolds live
Target Audience
Security Operations Center (SOC) Tier 1, Tier 2 and Tier 3 Analysts, Jr. roles in Threat Hunting and Threat
Intelligence Analysts, Jr. roles in Digital Forensics and Incident Response (DFIR). Anyone interested in detection
and security operations, and/or committed to the defense or security of enterprise networks.
Additional Information
Course Modules
◾ Windows Processes
◾ Gain a basic understanding of programs running within Windows
◾ Learn about Windows Services and their relationship with processes
◾ Review the common states of Windows Services
◾ Windows Registry
◾ Review the configuration structure of theWindows Registry
◾ Learn about the key-value pair relationship within the Windows Registry
◾ Understand the value types and formats for Windows Registry keys
◾ Credential Abuse
◾ Learn about the Windows Security Account Manager
◾ Learn about Windows Authentication
◾ Understand the concept of suspicious login activity
◾ Evaluate the behavior of brute-force login activity
◾ Web Application Attacks
◾ Learn about the configuration of Internet Information Services IIS in Windows
◾ Evaluate logging artifacts of local file inclusion for attacking web servers
◾ Evaluate logging artifacts of command injection and file upload for attacking web servers
◾ Binary Exploitation
◾ Learn about binary attacks through buffer overflows, and the artifacts they create
◾ Study the use of Windows Defender Exploit Guard and how it protects against binary exploitation
◾ Evaluate logging artifacts generated by the Windows Defender Exploit Guard
◾ Credential Abuse
◾ Understand suspicious logins and how to detect them in logs
◾ Understand brute-force password attacks and their log footprints
◾ Web Application Attacks
◾ Understand command injection attacks and their log footprint and detections
◾ Understand SQL injection attacks and their log footprint and detections
◾ Persistence on Disk
◾ Understand and recognize Persisting via Windows Service
◾ Understand and recognize Persisting via Scheduled Tasks
◾ Understand and recognize Persisting by DLLSideloading/Hijacking
◾ Persistence in Registry
◾ Understand Using Run Keys
◾ Understand Using Winlogon Helper
◾ Antivirus Basics
◾ Understand an Overview of Antivirus
◾ Network Segmentation
◾ Understand the concept of network segmentation
◾ Learn the benefits of network segmentation
◾ Understand possible methods of implementing network segmentation in an enterprise
◾ Detecting Egress Busting
◾ Understanding the concept of egress filtering
◾ Understanding an iptables firewall setup and application of egress filtering
◾ Evaluate an 'egress busting' technique and the logging artifacts it creates
◾ Port Forwarding and Tunneling
◾ Understand the concept of tunneling and port forwarding
◾ Learn how attackers use it to compromise additional machines in the network
◾ Understand the possible methods and tools attackers use to tunnel into the network and how to detect
them
◾ Windows Authentication
◾ Understanding Pass the Hash
◾ Understanding Brute Forcing Domain Credentials
◾ Understanding Terminal Services
◾ Abusing Kerberos Tickets
◾ Understanding Pass the Ticket
◾ Understanding Kerberoasting
◾ Active Directory Persistence
◾ Keeping Domain Access
◾ Understanding Domain Group Memberships
◾ Understanding Domain User Modifications
◾ Understanding Golden Tickets
Prerequisites
Learners are required to have basic knolwedge in Networking, Linux and Windows OS.