Major Update

FOR508™: Advanced Incident Response, Threat Hunting, and Digital Forensics™

GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Forensic Analyst (GCFA)
  • In Person (6 days)
  • Online
36 CPEs

Threat hunting, incident response, and digital forensics tactics and procedures continue to evolve rapidly. Your team cannot afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems. The key is to constantly look for attacks that get past security systems in order to catch intrusions in progress, rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is known as " threat hunting ". FOR508™ training teaches advanced skills to hunt, identify, counter, and recover from a wide range of threats within enterprise networks, including APT state-sponsored adversaries, organized crime syndicates, ransomware operators, and hacktivists.

What You Will Learn

Threat hunting and incident response tactics and procedures continue to evolve rapidly. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems, provide ineffective containment of the breach, and ultimately fail to rapidly remediate the incident or contain propagating ransomware. Incident response and threat hunting teams are the keys to identifying and observing malware indicators and patterns of activity in order to generate accurate threat intelligence that can be used to detect current and future intrusions. This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT state-sponsored adversaries, organized crime syndicates, ransomware operators, and hacktivists.

FOR508™: Advanced Incident Response and Threat Hunting™ Training Will Help You To:

  • Understand attacker tradecraft to perform compromise assessments
  • Detect how and when a breach occurred
  • Quickly identify compromised and infected systems
  • Perform damage assessments and determine what was accessed, stolen, or changed
  • Contain and remediate incidents
  • Track adversaries and develop threat intelligence to scope a network
  • Hunt down additional breaches using knowledge of adversary techniques
  • Build advanced forensics skills to counter anti-forensics and data-hiding techniques

The course exercises and final challenges illustrate real attacker activity found via end point artifacts, event logs, system memory, and more:

  • Phase 1 - Patient zero compromise and malware C2 beacon installation
  • Phase 2 - Privilege escalation, lateral movement to other systems, malware utilities download, installation of additional beacons, and obtaining domain admin credentials
  • Phase 3 - Searching for intellectual property, network profiling, business email compromise, dumping account credentials
  • Phase 4 - Find exfiltration point, collect and stage data for theft
  • Phase 5 - Perform cleanup and set long-term persistence mechanisms (alternatively this phase would be used to deploy ransomware)

Should A Breach Occur, FOR508 Graduates Will Have The Skills To:

  • Detect how and when attack happened
  • Quickly identify compromised and infected systems
  • Perform damage assessments and determine what was read, stolen, or changed
  • Contain and remediate incidents
  • Hunt down additional breaches using knowledge of the adversary

What You’ll Learn

  • Master tools and techniques to detect, contain, and remediate adversaries
  • Detect live, dormant, and custom malware across enterprise Windows systems
  • Hunt threats and perform incident response at scale
  • Identify malware beaconing, lateral movement, and C2 activity via memory analysis and Windows host forensics
  • Analyze breaches to determine root cause, attack vectors, and persistence mechanisms
  • Counter anti-forensics techniques, recover cleared data, and track attacker activity
  • Use forensic tools to remediate threats and secure the enterprise

Business Takeaways

  • Understand attacker tradecraft to perform proactive compromise assessments
  • Upgrade detection capabilities
  • Develop threat intelligence to track targeted adversaries and prepare for future intrusion events
  • Build advanced forensics skills to counter anti-forensics

What You Will Receive

  • SIFT Workstation
  • This course extensively uses the SIFT Workstation to teach incident responders and forensic analysts how to respond to and investigate sophisticated attacks.
  • The SIFT Workstation contains hundreds of free and open-source tools, easily matching any modern forensic and incident response commercial response tool suite.
  • A virtual machine is used with many of the hands-on class exercises.
  • Ubuntu Linux LTS Base.
  • 64-bit base system.
  • Better memory utilization.
  • Auto-DFIR package update and customizations.
  • Latest forensics tools and techniques.
  • VMware Appliance ready to tackle forensics
  • Docker and ELK pre-installed
  • Cross-compatibility between Linux and Windows.
  • Expanded file system support (NTFS, HFS, EXFAT, and more).
  • Electronic Download Package containing:
  • Disk images, triage images, memory captures, logs, and timelines from an enterprise-wide intrusion
  • SIFT Workstation virtual machines, tools, and documentation.
  • SANS Intrusion Analysis Electronic Exercise Workbook
  • An exercise workbook comprised of over 500 pages of detailed step-by-step instructions and examples to help you master incident response and threat hunting
  • SANS DFIR Cheat Sheets to help use the tools in the field
  • A multitude of bonus labs and practice data ensure students can continue working and learning long after the course is completed

Syllabus (36 CPEs)

Download PDF
  • Overview

    There are ways to gain an advantage against adversaries targeting you. It starts with the right mindset and knowing what works.

    The last decade has not been kind to network defenders. Threats to the modern enterprise are legion and attackers have used the enormous complexity of enterprise networks against us. But the tide is shifting. Over the past decade, we have seen a dramatic increase in sophisticated attacks against organizations. State-sponsored attackers, often referred to as Advanced Persistent Threat (APT) actors, have proved difficult to suppress. Massive financial attacks from the four corners of the globe have resulted in billions of dollars in losses. Ransomware and extortion became an existential threat almost overnight. While the odds are stacked against us, the best security teams are proving that these threats can be managed and mitigated. FOR508™ aims to bring those hard-won lessons into the classroom.

    Understanding attacks is critical to being able to detect and mitigate them. We start our education of attacker techniques on day one, learning common malware and attack characteristics and diving deep into techniques used by adversaries to maintain persistence in the network. Persistence is typically completed early in the attack cycle and students will learn hunting techniques to audit the network and accomplish early discovery. Living off the land binaries (local tools available in most environments), PowerShell, and WMI-based attacks in particular, have become standard operating procedure for advanced adversaries and students get a lot of practice with tools and techniques to identify such attacks at scale. We end the day with an in-depth discussion of Microsoft credentialing. The complexity of credentials in the modern enterprise cannot be overstated and credentials are the number one vulnerability present in every network. By understanding the tools and techniques being used to target credentials, students learn how to prevent, detect, and mitigate these devastating attacks.

    Exercises
    • APT Incident Response Scenario Introduction
    • Malware Persistence Detection and Analysis
    • Creating Local and Remote Triage Evidentiary Images
    • Scaling Remote Endpoint Incident Response
    Topics

    Real Incident Response Tactics

    • Preparation: Key tools, techniques, and procedures that an incident response team needs to respond properly to intrusions
    • Identification/Scoping: Proper scoping of an incident and detecting all compromised systems in the enterprise
    • Containment/Intelligence Development: Restricting access, monitoring, and learning about the adversary in order to develop threat intelligence
    • Eradication/Remediation: Determining and executing key steps that must be taken to help stop the current incident and the move to real-time remediation
    • Recovery: Addressing systemic weaknesses that lead to the incident
    • Lessons-Learned/Threat-Intel Consumption: Leverage the TTPs discovered to continue to hunt and detect similar intrusions in the future

    Threat Hunting

    • Hunting versus Reactive Response
    • Intelligence-Driven Incident Response
    • Building a Continuous Incident Response/Threat Hunting Capability
    • Forensic Analysis versus Threat Hunting Across Endpoints
    • Threat Hunt Team Roles
    • ATT&CK - MITRE's Adversarial Tactics, Techniques, and Common Knowledge

    Malware

    • Identification of Compromised Systems
    • Finding Active and Dormant Malware
    • Digital signatures for code signing
    • Malware Characteristics
    • Common Hiding and Persistence Mechanisms
    • Finding Evil by Understanding Normal
    • Malicious use of built-in commands (“Living off the Land”) and 3rd-party utilities

    Incident Response and Hunting Across the Enterprise

    • Rapid Response Tooling Solutions
    • PowerShell Remoting
    • PowerShell Remoting Credential Safeguards
    • Kansa PowerShell Remoting IR Framework
    • KAPE Triage Collection Tool
    • Velociraptor Incident Response Platform

    Malware Persistence Identification

    • AutoStart Locations, RunKeys
    • Service Creation/Replacement
    • Service Failure Recovery
    • Scheduled Tasks
    • DLL Hijacking Attacks
    • WMI Event Consumers

    Prevention, Detection, and Mitigation of Credential Theft

    • Pass the Hash
    • Token Stealing
    • Cached Credentials
    • LSA Secrets
    • NTLM Attacks
    • Kerberos Attacks
    • Golden Tickets
    • Kerberoasting
    • DCSync
    • NTDS.DIT theft
    • Bloodhound and Active Directory Graphing
    • Credential Attacks with Mimikatz, Metasploit, and many others
    • Technical and Architectural Mitigation Techniques
  • Overview

    Even the most advanced adversaries leave footprints everywhere. Learn the secrets of the best hunters.

    Cyber defenders have a wide variety of tools and artifacts available to identify, hunt, and track adversary activity in a network. Each attacker action leaves a corresponding artifact and understanding what is left behind as footprints can be crucial to both red and blue team members. Attacks follow a predictable pattern, and we focus our detective efforts on immutable portions of that pattern. As an example, at some point an attacker will need to run code to accomplish their objectives. We can identify this activity via application execution artifacts. The attacker will also need one or more accounts to run code. Consequently, account auditing is a powerful means of identifying malicious activity.

    Exercises
    • Hunting and Detecting Evidence of Execution at Scale
    • Discovering Credential Abuse
    • Tracking Lateral Movement
    • Hunting Malicious use of WMI and PowerShell
    Topics

    Advanced Evidence of Execution Detection

    • Attacker Tactics, Techniques, and Procedures (TTPs) Observed Via Process Execution
    • Prefetch Analysis
    • Application Compatibility Cache (ShimCache)
    • Amcache Registry Examination
    • Scaling ShimCache and Amcache Investigations

    Lateral Movement Adversary Tactics, Techniques, and Procedures (TTPs)

    • Compromising Credentials Techniques
    • Remote Desktop Services Misuse
    • Windows Admin Share Abuse
    • PsExec and Cobalt Strike Beacon PsExec Activity
    • Windows Remote Management Tool Techniques
    • PowerShell Remoting/WMIC Hacking
    • Cobalt Strike Lateral Movement and Credential Use
    • Vulnerability Exploitation

    Log Analysis for Incident Responders and Hunters

    • Profiling Account Usage and Logons
    • Tracking and Hunting Lateral Movement
    • Identifying Suspicious Services
    • Detecting Rogue Application Installation
    • Finding Malware Execution and Process Tracking
    • Capturing Command Lines and Scripts
    • Anti-Forensics and Event Log Clearing

    Investigating WMI and PowerShell-Based Attacks

    • WMI Overview
    • WMI Attacks Across the Kill Chain
    • Auditing the WMI Repository
    • WMI File System and Registry Residue
    • Command-Line Analysis and WMI Activity Logging
    • PowerShell Transcript and ScriptBlock Logging
    • Discovering Cobalt Strike beacon PowerShell Import Activity
    • Detecting PowerShell Injection from Cobalt Strike, Metasploit, and Empire
    • PowerShell Script Obfuscation
    • Microsoft Defender Logs, Detection History, and MPLog Analysis
  • Overview

    Using memory analysis sometimes feels like cheating. Finding active attacks shouldn't be this easy.

    Memory forensics has come a long way in just a few years. It is now a critical component of many advanced tool suites (notably EDR) and the mainstay of successful incident response and threat hunting teams. Memory forensics can be extraordinarily effective at finding evidence of worms, rootkits, PowerShell attacks, ransomware precursors, and advanced malware used by targeted attackers. In fact, some fileless attacks may be nearly impossible to unravel without memory analysis. Memory analysis was traditionally the domain of Windows internals experts and reverse engineers, but new tools, techniques, and detection heuristics have greatly leveled the playing field making it accessible today to all investigators, incident responders, and threat hunters. Further, understanding attack patterns in memory is a core analyst skill applicable across a wide range of endpoint detection and response (EDR) products, making those tools even more effective.

    Exercises
    • Detect Custom Malware in Memory
    • Examine Windows Process Trees
    • Locate Advanced “Beacon” Malware
    • Identify Advanced Malware Hiding Techniques
    • Analyze Memory from Multiple Infected Systems
    Topics

    Endpoint Detection and Response (EDR)

    • EDR Capabilities and Challenges
    • EDR and Memory Forensics

    Memory Acquisition

    • Acquisition of System Memory
    • Hibernation and Pagefile Memory Extraction and Conversion
    • Virtual Machine Memory Acquisition
    • Memory changes in Windows 10 and 11

    Memory Forensics Analysis Process for Response and Hunting

    • Understanding Common Windows Services and Processes
    • Identify Rogue Processes
    • Analyze Process Objects
    • Review Network Artifacts
    • Look for Evidence of Code Injection
    • Audit Drivers and Rootkit Detection
    • Dump Suspicious Processes and Drivers

    Memory Forensics Examinations

    • Live Memory Forensics
    • Memory Analysis with Volatility
    • Webshell Detection Via Process Tree Analysis
    • Code Injection, Malware, and Rootkit Hunting in Memory
    • Advanced Memory Forensics with MemProcFS
    • WMI and PowerShell Process Anomalies
    • Extract Memory-Resident Adversary Command Lines
    • Investigate Windows Services
    • Hunting Malware Using Comparison Baseline Systems
    • Find and Dump Cached Files from RAM

    Memory Analysis Tools

    • Velociraptor
    • Volatility
    • MemProcFS
  • Overview

    Timeline analysis will change the way you approach digital forensics, threat hunting, and incident response...forever.

    Temporal data is located everywhere on a computer system. Filesystem modification/access/creation/change times, log files, network data, registry data, and browser history files all contain time data that can be correlated and analyzed to rapidly solve cases. Pioneered by Rob Lee as early as 2001, timeline analysis has grown to become a critical incident response, hunting, and forensics technique. New timeline analysis frameworks provide the means to conduct simultaneous examinations on a multitude of systems across a multitude of forensic artifacts. Analysis that once took days now takes minutes.

    Exercises
    • Malware Discovery
    • Tracking Adversary Activity with Super-Timeline Analysis
    • Observe Attacker Movements Through Systems
    • Identify Intrusion Root Causes
    Topics

    Malware Discovery

    • Locate suspicious processes with entropy and signature analysis
    • Recover malicious files in AV quarantine
    • Use YARA for malware classification
    • Review malicious binaries with Capa

    Timeline Analysis Overview

    • Timeline Benefits
    • Prerequisite Knowledge
    • Finding the Pivot Point
    • Timeline Context Clues
    • Timeline Analysis Process

    Filesystem Timeline Creation and Analysis

    • MACB Timestamps
    • Windows Time Rules (File Copy versus File Move)
    • Filesystem Timeline Creation Using Sleuthkit, fls and MFTECmd
    • Bodyfile Analysis and Filtering Using the mactime Tool

    Super Timeline Creation and Analysis

    • Super Timeline Artifact Rules
    • Program Execution, File Knowledge, File Opening, File Deletion
    • Timeline Creation with log2timeline/Plaso
    • log2timeline/ Plaso Components
    • Filtering the Super Timeline Using psort
    • Targeted Super Timeline Creation
    • Super Timeline Analysis Techniques
    • Scaling Super Timeline Analysis with Elastic Search (ELK)
  • Overview

    Advanced adversaries are always improving. We must keep pace.

    Attackers commonly take steps to hide their presence on compromised systems. While some anti-forensics steps can be relatively easy to detect, others are much harder to deal with. As such, it’s important that forensic professionals and incident responders are knowledgeable on various aspects of the operating system and file system which can reveal critical residual evidence.

    Exercises
    • Volume Shadow Snapshot Analysis
    • Timelines
    • Anti-Forensics Analysis using NTFS
    • Timestomp Identification
    • Advanced Data Recovery
    Topics

    Volume Shadow Copy Analysis

    • Volume Shadow Copy Service
    • Options for Accessing Historical Data in Volume Snapshots
    • Accessing Shadow Copies with vshadowmount
    • Volume Shadow Copy Timelining

    Advanced NTFS Filesystem Tactics

    • NTFS Filesystem Analysis
    • Master File Table (MFT) Critical Areas
    • NTFS System Files
    • NTFS Metadata Attributes
    • Rules of Windows Timestamps for $StdInfo and $Filename
    • Detecting Timestamp Manipulation
    • Resident versus Nonresident Files
    • Alternate Data Streams
    • NTFS Directory Attributes
    • B-Tree Index Overview and Balancing
    • Finding Wiped/Deleted Files using the $I30 indexes
    • Filesystem Flight Recorders: $Logfile and $UsnJrnl
    • Common Activity Patterns in the Journals
    • Useful Filters and Searches in the Journals
    • What Happens When Data Is Deleted from an NTFS Filesystem?

    Advanced Evidence Recovery

    • Markers of Common Wipers and Privacy Cleaners
    • Deleted Registry Keys
    • Detecting "Fileless" Malware in the Registry
    • File Carving
    • Volume Shadow Carving
    • Carving for NTFS artifacts and Event Log Records
    • Effective String Searching
    • NTFS Configuration Changes to Combat Anti-Forensics
  • Overview

    Solving the final intrusion lab requires investigating artifacts on over thirty systems including Windows 10 and 11 workstations, DMZ servers, a domain controller, internal development servers, and hosted Exchange email. You will walk out of the course with hands-on experience investigating a real attack, curated by a cadre of instructors with decades of experience fighting advanced threats.

    Topics
    • The Intrusion Forensic Challenge requires analysis of multiple systems from an enterprise network with many endpoints.
    • Learn to identify and track attacker actions across an entire network finding initial exploitation, reconnaissance, persistence, credential dumping, lateral movement, elevation to domain administrator, and data theft/exfiltration
    • Witness and participate in a team-based approach to incident response.
    • Discover evidence of some of the most common and sophisticated attacks in the wild including Cobalt Strike, Sliver, Covenant, Remote Monitoring and Management (RMM) tools, PowerShell exploit frameworks, and custom nation-state malware.
    • During the challenge, each incident responder will be asked to answer key questions and address critical issues in the different categories listed below, just as they would during a real breach in their organizations:

    Identification And Scoping:

    • How and when was the network breached? Which system is "Patient Zero"?
    • How did the initial infection occur giving the attackers a foothold? What type of exploit was used?
    • When and how did the attackers first laterally move to each system?
    • What were the attacker's primary and secondary command and control backdoors?

    Containment And Threat Intelligence Gathering:

    • How and when did the attackers obtain domain administrator credentials?
    • What did the attackers look for on each system?
    • Damage Assessment: what data was stolen?
    • Damage Assessment: was email accessed or stolen?
    • Was any evidence of anti-forensics activity discovered?
    • Were the attackers able to access any cloud-based resources like cloud computing resources or cloud storage data?
    • Threat Intelligence: catalog host-based and network indicators of compromise.

    Remediation And Recovery:

    • What level of account compromise occurred? Is a full password reset required during remediation?
    • Based on the attacker techniques and tools discovered during the incident, what are the recommended steps to remediate and recover from this incident?
    • What systems need to be rebuilt?
    • What IP addresses need to be blocked?
    • What countermeasures should we deploy to slow or stop these attackers if they come back?
    • What recommendations would you make to detect these intruders in our network again?

GIAC Certified Forensic Analyst

The GIAC Certified Forensic Analyst (GCFA) certification focuses on core skills required to collect and analyze data computer systems. Candidates have the knowledge, skills, and ability to conduct formal incident investigations and handle advanced incident handling scenarios, including internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases.

  • Advanced Incident Response and Digital Forensics
  • Memory Forensics, Timeline Analysis, and Anti-Forensics Detection
  • Threat Hunting and APT Intrusion Incident Response
More Certification Details

Prerequisites

FOR508™ training is an advanced incident response and threat hunting course that focuses on detecting and responding to advanced persistent threats and organized crime threat groups.The course does not cover the basics of incident response policies or digital forensics.

We recommend that you should have a background in FOR500: Windows Forensics prior to attending this course.

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

MANDATORY FOR508™ SYSTEM HARDWARE REQUIREMENTS
  • CPU: 64-bit Intel i5/i7 (8th generation or newer), or AMD equivalent. A x64 bit, 2.0+ GHz or newer processor is mandatory for this class.
  • CRITICAL: Apple Silicon devices cannot perform the necessary virtualization and therefore cannot in any way be used for this course.
  • BIOS settings must be set to enable virtualization technology, such as "Intel-VTx" or "AMD-V" extensions. Be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary.
  • 16GB of RAM or more is required.
  • 350GB of free storage space or more is required.
  • At least one available USB 3.0 Type-A port. A Type-C to Type-A adapter may be necessary for newer laptops. Some endpoint protection software prevents the use of USB devices, so test your system with a USB drive before class.
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
MANDATORY FOR508™ HOST CONFIGURATION AND SOFTWARE REQUIREMENTS
  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 10.15.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • Linux hosts are not supported in the classroom due to their numerous variations. If you choose to use Linux as your host, you are solely responsible for configuring it to work with the course materials and/or VMs.
  • Local Administrator Access is required. (Yes, this is absolutely required. Don't let your IT team tell you otherwise.) If your company will not permit this access for the duration of the course, then you should make arrangements to bring a different laptop.
  • You should ensure that antivirus or endpoint protection software is disabled, fully removed, or that you have the administrative privileges to do so. Many of our courses require full administrative access to the operating system and these products can prevent you from accomplishing the labs.
  • Any filtering of egress traffic may prevent accomplishing the labs in your course. Firewalls should be disabled or you must have the administrative privileges to disable it.
  • Download and install VMware Workstation Pro 17+ (for Windows hosts), or VMWare Fusion Pro 13+ (for macOS hosts) prior to class beginning. Workstation Pro and Fusion Pro are now available free for personal use from the VMware website. Licensed commercial subscriptions to these products can also be used.
  • On Windows hosts, VMware products might not coexist with the Hyper-V hypervisor. For the best experience, ensure VMware can boot a virtual machine. This may require disabling Hyper-V. Instructions for disabling Hyper-V, Device Guard, and Credential Guard are contained in the setup documentation that accompanies your course materials.
  • Download and install 7-Zip (for Windows Hosts) or Keka (for macOS hosts). These tools are also included in your downloaded course materials.

Your course media is delivered via download. The initial media files for class can be large, with some files in the 30-40GB range. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as soon as you get the link. You will need your course media immediately on the first day of class. Do not wait until the night before class to start downloading these files.

Your course materials include a "Setup Instructions" document that details important steps you must take before you travel to a live class event or start an online class. It may take 30 minutes or more to complete these instructions.

Your class uses an electronic workbook for its lab instructions. In this new environment, a second monitor and/or a tablet device can be useful for keeping class materials visible while you are working on your course's labs.

If you have additional questions about the laptop specifications, please contact customer service.

Author Statement

“In the modern world, virtually everything we do crosses the wire—from work to entertainment, financial transactions to communications with friends and family. Almost everything in some way relies upon trusted networks and computing systems. As such, securing these systems is critical for cyber defenders in governments, corporations, small businesses, educational institutions, and even non-profits. Due to the rise in ransomware and extortion attacks, among other threats, essentially every network is at risk of cyber-attack. It is therefore critical to have trained personnel to react and respond when prevention fails.

FOR508 is the original SANS forensics and incident response course. It was built from the ground up and has evolved over many years to prepare individuals from every sort of organization on the analysis techniques necessary to find and neutralize network intruders. This course covers in great depth the methods to find malicious code, compromised accounts, attacker lateral movement and persistence, and data theft or destruction. Students walk away with the knowledge to detect these activities, both proactively for threat hunting and reactively for incident response. Then by understanding the nature and scope of the incident, defenders can contain the threat, eradicate the intruder, and restore operations. These are powerful capabilities that consistently allow our students to feel confident and empowered to face the threats that target the networks they protect. It continues to be truly exciting and motivating to play a part in this important endeavor."

- Mike Pilkinton

"The current cyber threat landscape consists of advanced adversaries that are well funded, equipped, and trained. Almost every government maintains offensive cyber operators tasked with maintaining access to an ever-increasing number of victim organizations. For espionage, intellectual property theft, or cyber warfare, governments continue to project power in the cyber domain. Organized crime groups also routinely target even small to medium-sized businesses with ransomware and other extortion attacks. All of these are targeted attacks that will not be deterred by preventive controls alone, and your network could be in the crosshairs of one or more of these groups.

Active cyber defense requires trained analysts who can identify signs of a cyber-attack, hunt for relevant indicators of compromise, scope the extent of the breach, and effectively remediate the situation. Adversaries constantly evolve their tactics, techniques, and procedures to increase the effectiveness of their campaigns. Defenders must also keep pace with these emerging threats to safeguard their organizations and the people who rely on them. FOR508 teaches actionable skills that are effective and scalable for detecting and responding to current attacks, regardless of the technology stack your organization deploys. Through hands-on exercises designed around a simulated breach, you will gain the experience and skills needed to be a part of the solution."

- Steve Anson

Reviews

I have been doing digital forensics for 13+ years. This course has still managed to build on my existing knowledge and made me challenge some pre-conceptions. It has given me tons of ideas to take home and develop to improve our enterprises security posture.
Ian Howard
Tesco
FOR508™ exceeded my expectations in every way. It provided me the skills, knowledge, and tools to effectively respond to and handle APTs and other enterprise-wide threats.
Josh M.
US Federal Agency
The content from the first day alone has quite a bit I can take back to work. There’s so much information as far as tools and techniques; if I hadn't taken this course (FOR508), I wouldn't have come across them.
Prathaben Kanagasingham
Medtronic
It's hard to really say something that will properly convey the amount of mental growth I have experienced in this training.
Travis Farral
XTO Energy

    Register for FOR508

    Learn about Group Pricing

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

    Loading...