Augmentech

Incident Response Training

Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems. The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is known as ” threat hunting “.
Understand attacker tradecraft to perform compromise assessments Detect how and when a breach occurred Quickly identify compromised and infected systems Perform damage assessments and determine what was read, stolen, or changed Contain and remediate incidents of all types Track adversaries and develop threat intelligence to scope a network Hunt down additional breaches using knowledge of the adversary Build advanced forensics skills to counter anti-forensics and data hiding from technical subjects