This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Education Courses
Announcement Banner

Users are unable to open Netwitness Support Cases via email. Please open support cases via portal or by phone

View Details
  • NetWitness Community
  • NetWitness Education
  • Courses
  • RSA NetWitness Platform Analysis 11.3
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

RSA NetWitness Platform Analysis 11.3

ElizabethMalone
Employee ElizabethMalone
Employee
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

on ‎2016-07-08 06:39 PM

On-demand

In order to register for a class, you need to first create a Dell Education account 

if you need further assistance, contact us.

Summary

This instructor-led course provides experience using the features and functions of RSA NetWitness Platform to to respond to and investigate incidents.

Overview

This instructor-led classroom-based course provides hands-on experience using the RSA NetWitness Platform to investigate and remediate security incidents. The course consists of about 50% hands-on lab work, following a practical methodology from the incident queue through investigation, event reconstruction, damage assessment, and documentation using real-world use cases.

Audience

Level 1 and Level 2 analysts relatively new to RSA NetWitness Platform, who wish to increase their familiarity with the tool’s features and functions within the context of incident response and analysis.

Duration

2 days

Prerequisite Knowledge/Skills

Students should have familiarity with the basic processes of cybersecurity forensic analysis, including some knowledge of network architecture, the TCP/IP stack, networking protocols, and integrating log & network traffic to perform analysis on network-based security events.

Students should have completed the following courses (or have equivalent knowledge) prior to taking this training:

RSA NetWitness Platform Foundations

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Describe SOC roles and models
  • Describe the Investigative Methodology
  • Identify types of incidents
  • Describe the Incident Response process
  • Use analysis tools and techniques to investigate an incident
  • Document the incident
  • Use the incident response process and tools to investigate an incident using packets
  • Use the incident response process and tools to investigate an incident using logs
  • Use the incident response process and tools to investigate an incident using packets and endpoint
  • Use the incident response process and tools to investigate an incident using logs, packets and endpoint

Course Outline

Analysis Tools and Processes

SOC Analyst

  • Security Operations Roles
  • SOC Models
  • Escalation Workflow

Investigative Methodology

  • Asking the Right Questions
  • Phase 1: Triage
  • Phase 2: Root Cause Analysis
  • Phase 3: Scoping Operations
  • Incident Types
  • Incident Response Process
  • Prioritizing Incidents

Incident Response Tools

  • Monitoring the Respond Interface
  • Assigning an Incident
  • Reviewing Threat Intelligence
  • Obtaining Event Details
  • Reviewing Logs
  • What Should You Look For?
  • Obtaining Additional Information
  • Performing Analysis
  • Investigating Events
  • Creating Meta Groups, Queries, Custom Column Groups, and Profiles
  • Viewing Encrypted Traffic
  • Documenting the Incident
  • Closing/Escalating/Remediating the Incident
  • Analysis Methodology

Investigating Metadata

NetWitness Metadata

  • Layered Contextual Approach
  • Traffic Directionality
  • Network Layer Context Meta
  • Endpoint Process Meta
  • Endpoint Registry Meta
  • Endpoint Network-Process Meta
  • Windows Security Event Log Meta
  • Meta Groups
  • Compromise Meta
  • Session, Service and File Characteristics

Identifying Anomalies

  • Services
  • Protocol Anomalies: HTTP

Threat Examples

  • Phishing
  • Malware
  • Lateral Movement
  • Webshells
  • Command Control
  • Data Exfiltration

Analysis Use Cases

  • Responding to a Phishing incident using Packets
  • Responding to a Suspicious Activities incident using Logs
  • Responding to a Drive-by Download incident using Packets and Endpoint
  • Responding to an Apache Struts Exploit incident using Packets, Logs and Endpoint

 

On-demand

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

  • 11
  • 11.3
  • 11.x
  • anomalous sessions
  • attack vectors
  • basic
  • Best Practices
  • detect
  • Ed Services
  • education
  • Education Services
  • english
  • ESA
  • event correlation
  • fee
  • fee-required
  • Getting Started
  • in person training
  • Incident
  • incident responder
  • instructor-led training
  • Investigation
  • logs & network
  • logs and packets
  • manage
  • navigator
  • NetWitness
  • netwitness navigator
  • netwitness training
  • NW
  • NWP
  • on demand classroom
  • on-demand classroom
  • Product Training
  • protocol headers
  • reconstruct
  • reconstruction
  • respond
  • RSA NetWitness
  • rsa netwitness logs & network
  • RSA NetWitness Platform
  • RSA NetWitness Training
  • RSA University
  • RSAU
  • security events
  • soc manager
  • threat hunter
  • training
  • Training Course
  • Version 11
  • Vulnerabilities
Was this article helpful? Yes No
0 Likes
Share
Version history
Last update:
‎2016-07-08 06:39 PM
Updated by:
Employee ElizabethMalone
Contributors
  • ElizabethMalone
    ElizabethMalone
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.