SANS SEC467.1 Social Engineering Fundamentals, Recon, and Phishing
فهرست مطالب کتاب Social Engineering Fundamentals, Recon, and Phishing:
Introduction to SE Concepts
The Psychology of Social Engineering
Social Engineering Goals
LAB: Setting up for Success
Targeting and Recon
LAB: Recon and Profiling Exercise
Secure and Convincing Phishing
Tracking Clicks
LAB: Tracking Clicks
Secure Phishing Forms
LAB: SET Site Cloning
LAB: Data Logging
SANS SEC467.2 Media Drops and Payloads, Pretexting, Physical Testing, and Reporting
فهرست مطالب کتاب Media Drops and Payloads, Pretexting, Physical Testing, and Reporting:
USB and Media Drops
Building a Payload
LAB: PowerShell payloads
LAB: Roll Your Own
Clicks That Work
LAB: Pretty Payloads
Successful Pretexting
LAB: Pretexting
Tailgating and Physical Access
Social Engineering Reports
SE: Where it all Fits
Risky Business
Final LAB: Capture the Human
SANS SEC541.1 Management Plane and Network Logging
فهرست مطالب کتاب Management Plane and Network Logging:
Code Spaces Attack
Course Overview
EXERCISE: Deploy Section 1 Environment
MITRE ATT&CK and Definitions
API Logging
EXERCISE: Detecting Cloud Service Discovery Attack with CloudTrail
Parsing JSON
Cloud-Native Logging Services
EXERCISE: Parsing Logs with jq
Network Flow Logging
Capturing Raw Network Traffic
EXERCISE: Network Analysis with VPC Flow Logs
SANS SEC541.2 Compute and Cloud Services Logging
فهرست مطالب کتاب Compute and Cloud Services Logging:
Tesla Attack
EXERCISE: Deploy Section 2 Environment
Host Logs
EXERCISE: Host Log Discovery
Log Agents
EXERCISE: CloudWatch Customization
Containers
Managed Container Services
EXERCISE: Strange Container Activity
Cloud Service Logs
EXERCISE: Finding Data Exfiltration
SANS SEC541.3 Cloud Service and Data Discovery
فهرست مطالب کتاب Cloud Service and Data Discovery:
Capital One Attack
Metadata Service and GuardDuty
EXERCISE: Metadata and GuardDuty
Cloud Inventory
EXERCISE: Cloud Inventory
Data Discovery
EXERCISE: Detecting Sensitive Data
Vulnerability Analysis Services
EXERCISE: Vulnerability Analysis
Data Centralization Techniques
EXERCISE: Data Centralization with Graylog
SANS SEC541.4 Microsoft Ecosystem
فهرست مطالب کتاب Microsoft Ecosystem:
Malwarebytes Attack
Microsoft 365
EXERCISE: Microsoft 365 Exchange Investigation
SolarWinds Attack
Azure Active Directory (AD)
EXERCISE: Introduction to KQL
Storage Monitoring
EXERCISE: Log Analytics Using Azure CLI
Detection Services
EXERCISE: Microsoft Defender for Cloud and Sentinel
Network Traffic Analysis
EXERCISE: Azure Network Traffic Analysis
SANS SEC541.5 Automated Response Actions and CloudWars
فهرست مطالب کتاب Automated Response Actions and CloudWars:
Automated Response Actions
IT Ops Workflows
Security Workflows
EXERCISE: Set Up AutoForensic
Constructing Response Actions
EXERCISE: Run AutoForensic
CloudWars
SANS SEC542.1 Introduction and Information Gathering
فهرست مطالب کتاب Introduction and Information Gathering:
Why the Web?
Application Assessment Methodologies
Web Application Pen Tester’s Toolkit
Interception Proxies
EXERCISE: Configuring Interception Proxies
Open Source Intelligence (OSINT)
Virtual Host Discovery
EXERCISE: Virtual Host Discovery
HTTP Syntax and Semantics
HTTPS and Testing for Weak Ciphers
EXERCISE: Testing HTTPS
Target Profiling