SANS SEC467.1 Social Engineering Fundamentals, Recon, and Phishing

فهرست مطالب کتاب Social Engineering Fundamentals, Recon, and Phishing:

Introduction to SE Concepts

The Psychology of Social Engineering

Social Engineering Goals

LAB: Setting up for Success

Targeting and Recon

LAB: Recon and Profiling Exercise

Secure and Convincing Phishing

Tracking Clicks

LAB: Tracking Clicks

Secure Phishing Forms

LAB: SET Site Cloning

LAB: Data Logging

SANS SEC467.2 Media Drops and Payloads, Pretexting, Physical Testing, and Reporting

فهرست مطالب کتاب Media Drops and Payloads, Pretexting, Physical Testing, and Reporting:

USB and Media Drops

Building a Payload

LAB: PowerShell payloads

LAB: Roll Your Own

Clicks That Work

LAB: Pretty Payloads

Successful Pretexting

LAB: Pretexting

Tailgating and Physical Access

Social Engineering Reports

SE: Where it all Fits

Risky Business

Final LAB: Capture the Human

SANS SEC541.1 Management Plane and Network Logging

فهرست مطالب کتاب Management Plane and Network Logging:

Code Spaces Attack

Course Overview

EXERCISE: Deploy Section 1 Environment

MITRE ATT&CK and Definitions

API Logging

EXERCISE: Detecting Cloud Service Discovery Attack with CloudTrail

Parsing JSON

Cloud-Native Logging Services

EXERCISE: Parsing Logs with jq

Network Flow Logging

Capturing Raw Network Traffic

EXERCISE: Network Analysis with VPC Flow Logs

SANS SEC541.2 Compute and Cloud Services Logging

فهرست مطالب کتاب Compute and Cloud Services Logging:

Tesla Attack

EXERCISE: Deploy Section 2 Environment

Host Logs

EXERCISE: Host Log Discovery

Log Agents

EXERCISE: CloudWatch Customization

Containers

Managed Container Services

EXERCISE: Strange Container Activity

Cloud Service Logs

EXERCISE: Finding Data Exfiltration

SANS SEC541.3 Cloud Service and Data Discovery

فهرست مطالب کتاب Cloud Service and Data Discovery:

Capital One Attack

Metadata Service and GuardDuty

EXERCISE: Metadata and GuardDuty

Cloud Inventory

EXERCISE: Cloud Inventory

Data Discovery

EXERCISE: Detecting Sensitive Data

Vulnerability Analysis Services

EXERCISE: Vulnerability Analysis

Data Centralization Techniques

EXERCISE: Data Centralization with Graylog

SANS SEC541.4 Microsoft Ecosystem

فهرست مطالب کتاب Microsoft Ecosystem:

Malwarebytes Attack

Microsoft 365

EXERCISE: Microsoft 365 Exchange Investigation

SolarWinds Attack

Azure Active Directory (AD)

EXERCISE: Introduction to KQL

Storage Monitoring

EXERCISE: Log Analytics Using Azure CLI

Detection Services

EXERCISE: Microsoft Defender for Cloud and Sentinel

Network Traffic Analysis

EXERCISE: Azure Network Traffic Analysis

SANS SEC541.5 Automated Response Actions and CloudWars

فهرست مطالب کتاب Automated Response Actions and CloudWars:

Automated Response Actions

IT Ops Workflows

Security Workflows

EXERCISE: Set Up AutoForensic

Constructing Response Actions

EXERCISE: Run AutoForensic

CloudWars

SANS SEC542.1 Introduction and Information Gathering

فهرست مطالب کتاب Introduction and Information Gathering:

Why the Web?

Application Assessment Methodologies

Web Application Pen Tester’s Toolkit

Interception Proxies

EXERCISE: Configuring Interception Proxies

Open Source Intelligence (OSINT)

Virtual Host Discovery

EXERCISE: Virtual Host Discovery

HTTP Syntax and Semantics

HTTPS and Testing for Weak Ciphers

EXERCISE: Testing HTTPS

Target Profiling