This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Education Courses
  • NetWitness Community
  • NetWitness Education
  • Courses
  • NetWitness Platform Analysis 11.5
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

NetWitness Platform Analysis 11.5

JosephCantor
Employee JosephCantor
Employee
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

on ‎2020-11-19 02:43 PM - edited on ‎2021-10-27 09:30 AM by Occasional Contributor JorgeMares Occasional Contributor

On-demand

 

In order to register for a class, you need to first create a Dell Education account 

if you need further assistance, contact us.

Check out the newly released 11.6 ILT class here

Summary

This instructor-led course provides experience using the features and functions of RSA NetWitness Platform to respond to and investigate security incidents.

 

Overview

This classroom training provides hands-on experience using the RSA NetWitness Platform to investigate and document security incidents. The course consists of about 50% hands-on lab work, following a practical methodology from the incident queue through investigation, event reconstruction, damage assessment, and documentation using real-world use cases

 

Audience

Level 1 and Level 2 analysts relatively new to RSA NetWitness Platform, who wish to increase their familiarity with the tool’s features and functions within the context of incident response and analysis.

 

Duration

2 days

 

Prerequisite Knowledge/Skills

Students should have familiarity with the basic processes of cybersecurity analysis, including some knowledge of network architecture, the TCP/IP stack, networking protocols, and integrating log & network traffic to perform analysis on network-based security events.

 

Students should have completed the following courses (or have equivalent knowledge) prior to taking this training:

RSA NetWitness Platform Foundations

 

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Identify Analyst roles and SOC models
  • Describe incident types and methods to prioritize incidents
  • Describe the Incident Response process
  • Use analysis tools and interfaces to perform incident response
  • Describe the Investigative Methodology
  • Describe a systematic approach to investigate metadata
  • Describe the Investigation Model
  • Identify types of threats
  • Use the incident response process, the investigative methodology and tools to investigate multiple use cases using packets, logs and endpoint

 

Course Outline

  • Analysis Tools and Processes
    • Security Operations models
      • Security Operations Roles
      • SOC Models
      • Escalation Workflow
    • Incident Response Process
    • Incident Response Tools
      • Monitoring the Respond Interface
      • Assigning an Incident
      • Reviewing Threat Intelligence
      • Obtaining Event Details
      • Reviewing Logs
      • What Should You Look For?
      • Obtaining Additional Information
      • Performing Analysis
      • Investigating Events
      • Creating Meta Groups, Queries, Query Profiles,Custom Column Groups, and Profiles
      • Viewing Encrypted Traffic
      • Documenting the Incident
      • Closing/Escalating/Remediating the Incident
      • Analysis Methodology
  • Investigating Metadata
    • Investigative Methodology
      • Asking the Right Questions
      • Phase 1: Triage
      • Phase 2: Root Cause Analysis
      • Phase 3: Scoping Operations
      • Incident Types
      • Incident Response Process
      • Prioritizing Incidents
    • NetWitness Metadata
      • Layered Contextual Approach
      • Traffic Directionality
      • Network Layer Context Meta
      • Endpoint Process Meta
      • Endpoint Registry Meta
      • Endpoint Network-Process Meta
      • Windows Security Event Log Meta
      • Meta Groups
      • Compromise Meta
      • Session, Service and File Characteristics
    • Threat Examples
      • Phishing
      • Malware
      • Lateral Movement
      • Webshells
      • Command Control
      • Data Exfiltration
  • Analysis Use Cases
    • Responding to a Phishing incident using Packets
    • Responding to a Suspicious Activities incident using Logs
    • Responding to a Drive-by Download incident using Packets and Endpoint
    • Responding to an Apache Struts Exploit incident using Packets, Logs and Endpoint

 

Schedule & Register

Schedule Only

On-demand

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

  • 11
  • 11.3
  • 11.x
  • anomalous sessions
  • attack vectors
  • basic
  • Best Practices
  • detect
  • Ed Services
  • education
  • Education Services
  • english
  • ESA
  • event correlation
  • fee
  • fee-required
  • Getting Started
  • in person training
  • Incident
  • incident responder
  • instructor-led training
  • Investigation
  • logs & network
  • logs and packets
  • manage
  • navigator
  • NetWitness
  • netwitness navigator
  • netwitness training
  • NW
  • NWP
  • on demand classroom
  • on-demand classroom
  • Product Training
  • protocol headers
  • reconstruct
  • reconstruction
  • respond
  • RSA NetWitness
  • rsa netwitness logs & network
  • RSA NetWitness Platform
  • RSA NetWitness Training
  • RSA University
  • RSAU
  • security events
  • soc manager
  • threat hunter
  • training
  • Training Course
  • Version 11
  • Vulnerabilities
Was this article helpful? Yes No
0 Likes
Version history
Last update:
‎2021-10-27 09:30 AM
Updated by:
Occasional Contributor JorgeMares Occasional Contributor
Contributors
  • JorgeMares
    JorgeMares
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.