Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

AX310 Magnet Axiom Incident Response Examinations

AX310 is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and incident response techniques and want to improve computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

Description

AX310 will give participants the knowledge and skills they need to track incidents where unauthorized computer access and file usage has taken place on a computer system. This course utilizes Magnet Axiom, Axiom Cyber, Axiom Ignite (Cloud investigation tool), Magnet Response and third-party tools to explore the evidence in greater depth by learning about volatile data will be created to capture volatile data in class that students can take with them for use in applications beyond the classroom.

In this course, a deeper understanding of investigating incidents involving malware and network intrusions into Windows computers will be provided. Students will conduct a static analysis of malware and learn about sandbox malware.

After the static analysis of the malware, students will activate the malware in the virtual environment and conduct a dynamic analysis. They will also capture packets during the malware activation to capture information from the malware regarding its command and control server. An analysis of the captured information from the network communication will then be conducted to determine what the malware is designed to do, such as spread laterally on the network, escalate user privileges, create new users, search for PII or send collected data back to the command and control server.

By searching through artifacts like Windows Prefetch, SRUM, AMCACHE, Jumplists, LNK files, SHIMCACHE, MUICACHE, UserAssist, Windows Event logs, and the $Logfile, participants will determine the initial attack vector of the malware and the chain of events that took place thereafter.

What to Expect

Hear directly from Hoyt Harness, Forensic Trainer at Magnet Forensics, about why you should take our Magnet Axiom Incident Response Examinations (AX310) course, what you can expect when you take it, and what type of real-life experience he brings to the classroom.

Course Prerequisites

Because AX310 is an expert-level course, it is recommended that students first complete Magnet Axiom Examinations (AX200). AX200 will provide a thorough understanding of Axiom that will help students focus on the Incident Response part of investigations in AX310.  Click Here to find out more about AX200.

Course Modules

AXIOM INCIDENT RESPONSE EXAMINATIONS (AX310) MODULES

Each module of instruction employs instructor-led and student practical exercises to reinforce the learning objectives and provide the participants with the knowledge and skills necessary to successfully utilize Magnet Axiom in their investigative workflow.

MODULE 1: COURSE INTRODUCTION AND MAGNET INSTALLATION

  • Students will be introduced to each other, to the instructor(s) and to Magnet Axiom.

MODULE 2: COURSE OVERVIEW

  • An overview of the course will be presented to students along with the learning objectives and expected outcomes for the four-day training event.

MODULE 3: MITRE ATT&CK NAVIGATOR AND NIST CONTROLS

  • This module focuses on how you can map and plot an adversary in your network, understand the goals a threat tries to obtain and what techniques that are available under each attack goal. The participant will also see how the NIST controls can be used to help organization prepare policies and help identify areas in your policies or procedures that may need to be updated. Also, this module will show the Cyber Kill Chain and PRESENT mitigation steps used against attacker.

MODULE 4: MALWARE OVERVIEW

  • A high-level overview of the different types of malwares seen and what they can do. Showing how the threat actors will utilize tools that come on a Windows computer by default, like PowerShell or Schedule tasks so they can keep persistence and other tools.

MODULE 5: WHERE DO WE START?

  • The student will examine the information provided by the initial incident reporter and then look and understand if the information can be corroborated or not, the investigator will also check to see if the time frame needs to be widened thereby increasing the scope of the investigation.

MODULE 6: Packet Captures (PCAP) 

  • Network traffic is sometimes key to understanding how malware arrived at the network and how the malware allows nefarious actors to travel through the network. This module focuses on capturing, filtering, and analyzing network traffic to track down network intrusions and perform network forensics.

MODULE 7: IRTK & MAGNET RESPONSE

  • During this module, students will learn the necessity of collecting volatile data from a suspect computer. They will use the output to determine a starting point for the examination while the forensic images are being processed by Axiom.

MODULE 8: RAM

  • Participants will parse RAM from a computer involved in a malware incident and determine what programs were running and from what location. Students will also investigate the malware to determine what computer user was associated with it.

MODULE 9: AXIOM CYBER INVESTIGATOR

  • Using the Axiom Cyber license the participant will understand the benefits of having a tools that can connect to a remote computer and grab volatile data, make full disk images and get important files and folders. They will learn how to create a Cyber agent, configure it for the remote, deploy it and pull the data back to the investigating computer in real time.

MODULE 10: STATIC ANALYSIS OF MALWARE

  • Participants will set up and learn how mark their tools if used to conduct investigations thereby identifying rouge tools. Using third party tools to examine potential malware files without them being detonated and pulling strings from within the suspicious file.

MODULE 11: PATTERN MATCHING & SEARCHING WITH YARA

  • This module will use the information obtained from the previous module and use that data to create a pattern matching rule using YARA. The participant will understand the makeup of a YARA rule and how to correctly security mark the rule using the TLP protocol. Once the rule is created use that to search our data set for hits.

MODULE 12: ONLINE ANALYSIS OF MALWARE

  • In this module, students will online sandbox environments to monitor the activity of the malware. They will learn of some of the pit falls of using online sandboxes.

MODULE 13: LOG FILES AND WHY THEY ARE IMPORTANT

  • Students will understand an important step of the investigation is to gather log files. Where they can be found, and the different types of logs or other areas that can provide information what the computer was doing like, Prefetch, SRUM, AMCACHE, JUMPLIST, LNK, USERASSIST.

MODULE 14: BRINGING OUR INVESTIGATION TO A CLOSE

  • During the module, students will learn how to put all the pieces of the investigation together through the correlation of all the data they have collected during the preceding modules.

MODULE 15: ANOTHER TYPE OF INCIDENT RESPONSE INVESTIGATION?

  • To further reinforce the instructional goals of the course, students are presented with a final scenario, which represents a cumulative review of the exercises conducted in each of the previous modules.

Additional Information

Who Should Attend: Participants who are unfamiliar with the principles of digital forensics
Advanced Preparation: None
Program Level: Advanced-level
Field of Study: Computer Software & Applications
Delivery Method: Group Internet Based & Group Live

Advanced Preparation: None
Program Level: Advanced-level
Field of Study: Computer Software & Applications
Delivery Method: Group Internet Based & Group Live

Refunds and Cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 226-499-8962. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.

Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.

Interested in Private Training or Hosting a Training Class?

Similar courses

AX100 Forensic Fundamentals

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics. Magnet Forensics Training is hosted in a variety of time zones. Prior to registration, please confirm the time zone for the class you wish to register in. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
GK200 Magnet Graykey Examinations

This course is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS examinations and the use of the Magnet Graykey device. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX250 Magnet Axiom Advanced Computer Forensics

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX300 Magnet Axiom Advanced Mobile Forensics

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX200 Magnet Axiom Examination

Magnet Axiom Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to Axiom. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX320 Magnet Axiom Internet & Cloud Investigations

This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX350 Magnet Axiom macOS Examinations

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on macOS and the forensic analysis of devices using the APFS file system and AXIOM. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX250 Magnet Axiom Advanced Computer Forensics Online Self Paced

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX220 Magnet Axiom iOS Filesystem Analysis

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
AX100 Forensic Fundamentals Online Self Paced

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information
DV200 Digital Video Investigations

Digital Video Investigations with Magnet Witness (DV200) is a beginner-level course, designed for participants who are not yet familiar with the concepts of the recovery and analysis of digital video files from commercially available digital video recorders.

More Information
Magnet Axiom to Magnet Axiom Cyber Transition

Magnet Axiom to Cyber Transitions is ideal for those who are looking to continue their education and transition into the unique features of Axiom Cyber after taking the Axiom Examinations (AX200) course.

More Information
AX200 Magnet Axiom Examination Microlearning

Magnet Axiom Examination (AX200 Microlearning) is ideal for those who are relatively new to forensics and want to learn how to utilize Axiom to get the most out of the forensic platform. Axiom is a platform that covers cases involving mobile device, computer, and cloud data in a single collaborative interface. Students will learn the workflows of how to interrogate and investigate devices containing digital media.

More Information
AX150 Core Mobile Acquisition & Analysis

Core Mobile Acquisition and Analysis (AX150) is a beginner level course, designed for participants who are unfamiliar with the principles of mobile forensics. The course focuses on iOS and Android devices from the point of collection to the point of analysis whilst exploring Magnet Axiom and Magnet tools such as Magnet Acquire, the Magnet Custom Artifact Generator (MCAG) and Magnet Axiom Dynamic App Finder.

More Information

Press enter to see more results