Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

AX310 Magnet AXIOM Incident Response Examinations

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and are seeking to expand their knowledge on advanced forensics and incident response techniques as well as improve computer investigations in relation to incident response.

Description

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and are seeking to expand their knowledge on advanced forensics and incident response techniques as well as improve computer investigations in relation to incident response.

What to Expect

Hear directly from Hoyt Harness, Forensic Trainer at Magnet Forensics, about why you should take our Magnet AXIOM Incident Response Examinations (AX310) course, what you can expect when you take it, and what type of real-life experience he brings to the classroom.

Course Prerequisites

Because AX310 is an expert-level course, it is recommended that students first complete Magnet AXIOM Examinations (AX200). AX200 will provide a thorough understanding of AXIOM that will help students focus on the Incident Response part of investigations in AX310.  Click Here to find out more about AX200.

Course Modules

MODULE 1: INTRODUCTION AND INSTALLATION OF MAGNET AXIOM

  • An introduction to the other students, the instructor(s) and Magnet AXIOM.
  • The functionality of AXIOM will be discussed, and the module will conclude with hands-on exercises during which participants will install AXIOM and learn about its associated programmatic components: AXIOM Process and AXIOM Examine.

MODULE 2: COURSE OVERVIEW

  • An overview of the course will be presented along with the learning objectives and expected outcomes for the four-day training event.
  • Evidence files will be presented and the scenario in which this course of instruction will follow – including the two main players in this scenario who may or may not have been complicit in the malware introduction.

MODULE 3: MALWARE OVERVIEW

  • Malware will be focused on, specifically, the footprints left behind from it, its common behavior, and what Windows is doing to stop it. Malware is dynamic and with each version of Windows that approaches, malware authors will have to take also change.

MODULE 4: PACKET CAPTURES (PCAP)

  • Network traffic is sometimes key to understanding how malware arrived into the network and how the malware allows nefarious actors to travel through the network.
  • Learn how to capture, filter, and analyze network traffic to track down network intrusions and perform network forensics.
  • Also learn about Wireshark and understand what a packet sniffer and protocol analyzer is.

MODULE 5: INCIDENT RESPONSE TOOLKIT

  • The concepts of volatile data collection from a running computer consists of more than just RAM collection.
  • Learn the necessity of collecting volatile data from a suspect computer and use the output to determine a starting point for the examination while the forensic images are being processed by AXIOM.
  • Compare the output from volatile data collected from a running computer against the forensic image to locate root-kits and hidden malware.

MODULE 6: RAM

  • Parse RAM from a computer involved in a malware incident and determine what programs were running and from what location.
  • Investigate the malware to determine what computer user was associated with it. From RAM, recover if there were any network connections or established listening ports from where the malware could communicate.
  • Learn how PCAP exists in RAM and how to export PCAP from RAM.
  • Gain an understanding on how to process PCAP files from RAM to assist in the forensic examination.

MODULE 7: STATIC ANALYSIS OF MALWARE

  • Set up and learn how to utilize virtual machine technology and Kali Linux to leverage good forensic practices and intrusion detection methodologies to infect a computer and examine the results and behavior of the malware.
  • Learn how to set up the virtual network to ensure the malware cannot escape into the wild or laterally spread and the good forensic process of examining malware designed for one operating system in a separate operating system to keep it from activating.

MODULE 8: DYNAMIC ANALYSIS OF MALWARE

  • Setup a Windows computer similar to the OS from the suspect computer and activate the extracted malware in a controlled environment (sandbox) and monitor the activity of the malware. In order to see the malware extracted from a forensic image of hard drive, this process gives the examiner the ability to determine what remote hosts the malware wants to communicate with and other actions on the computer in a safe manner. Utilizing previously learned methodologies, participants will capture the traffic of the malware live in its environment and utilize that information in the furtherance of the investigation.

MODULE 9: WRAPPING UP THE INVESTIGATION

  • Put all of the pieces or this malware puzzle together in order to get ready to report on the findings of their investigation.
  • Learning the artifact-first approach of AXIOM, students will examine Prefetch, SRUM, AMCACHE, JUMPLISTS, LNK Files, Recent file/folders, SHIMCACHE, MUICACHE, User Assist, and Windows event logs to aid in telling the malware story.

MODULE 10: FINALIZING THE INVESTIGATION

  • Learn how to put all the pieces of the investigation together through the correlation of all the data collected during the preceding modules.
  • Correlate the data recovered from the volatile collection using the incident response toolkit with the artifacts recovered from the evidence files of the computers in question and the PCAP files recovered from RAM and the network monitoring tools.
  • Extract information from the firewall settings in Windows to determine if there is a hole in the firewall for the malware to communicate. By utilizing the $Logfile students will be able to determine if the malware files were renamed, moved, or deleted and if so when.

MODULE 11: CUMULATIVE REVIEW EXERCISE

  • Throughout the four-day training event, instructor-led and student practical exercises are used to reinforce the learning objectives and provide the participants with the knowledge and skills necessary to successfully utilize the material taught and Magnet AXIOM in their investigative workflow.
  • To further reinforce the instructional goals of the course, students are presented with a final scenario-based practical exercise which represents a cumulative review of the exercises conducted in each of the previous modules.

Additional Information

Who Should Attend: Participants who are unfamiliar with the principles of digital forensics
Advanced Preparation: None
Program Level: Advanced-level
Field of Study: Computer Software & Applications
Delivery Method: Group Internet Based & Group Live

Refunds and Cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 226-499-8962. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.

Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.

Interested in Private Training or Hosting a Training Class?

Similar courses

AX100 Forensics Fundamentals

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics.

More Information
AX301 MAGaK (Magnet AXIOM & GrayKey) Advanced iOS Examinations

This course is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS examinations and the use of the GrayKey device.

More Information
AX250 Magnet AXIOM Advanced Computer Forensics

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations.

More Information
AX300 Magnet AXIOM Advanced Mobile Forensics

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations.

More Information
CY200 Magnet AXIOM Cyber Examinations

Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to AXIOM Cyber.

More Information
AX200 Magnet AXIOM Examination

Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to AXIOM.

More Information
AX320 Magnet AXIOM Internet & Cloud Investigations

This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics.

More Information
AX350 Magnet AXIOM macOS Examinations

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on macOS and the forensic analysis of devices using the APFS file system and AXIOM.

More Information
AX200 Magnet AXIOM Examination Online Self Paced

Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to AXIOM.

More Information
AX250 Magnet AXIOM Advanced Computer Forensics Online Self Paced

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations.

More Information
Magnet Certified Forensics Examiner - AXIOM

The Magnet Certified Forensics Examiner (MCFE) certification is an accreditation that showcases an examiners’ expert-level competence with Magnet Forensics products to peers, internal stakeholders and external audiences, including legal teams or clients. Our certification program is free to users who have completed the prerequisite training courses.

More Information
TAP (Training Annual Pass)

TAP lets you pay once but train continuously. For a price of $5,995 US, you can attend any Magnet Forensics Training class at any time, at any location throughout the following 12 months. But TAP doesn’t stop in the classroom. You can also attend our world-class online training offerings, both Online Instructor-Led, and Online Self-Paced.

More Information
IEF 200 Magnet IEF Examinations Online Self-Paced (OSP)

IEF Examinations (IEF200) is an intermediate level course, designed for participants who are familiar with the principles of digital forensics, and seeking to use Magnet IEF for their investigations. Whether you are looking to gain expertise in smartphone or computer digital forensics using IEF, IEF200 is the right course for you.

More Information
Magnet Certified Forensics Examiner - IEF

The Magnet Certified Forensics Examiner (MCFE) certification is an accreditation that showcases an examiners’ expert-level competence with Magnet Forensics products to peers, internal stakeholders and external audiences, including legal teams or clients. Our certification program is free to users who have completed the prerequisite training courses.

More Information
AX302 Magnet AXIOM Advanced iOS Examinations

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations.

More Information
AX100 Forensic Fundamentals Online Self Paced

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics.

More Information

Press enter to see more results