• English
  • Mon - Fri 8.00 - 18.00
  • 5 rue Goell L-5326 Contern
  • + 352 26 20 39 64
Excellium University
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog

Awareness on Infrastructure Breaches

Teachers
Paul Jung
Category:
APPLICATION SECURITY /
Free
Awareness on Infrastructure Breaches

Free

Duration: 2.5 hours

DATE :

On-demand

COURSE DESCRIPTION

The student will have a two-and-a-half-hour session, which should enable him to understand the required skills, decision impacts and needs in order to react efficiently before and during a security incident.

The following knowledge will be share:

  • Case A – Breach for money
    • In this scenario, an attacker breached the information system by using a simple drive-by download impersonating a Firefox update. The attacker pivoted and mapped the internal network then deployed a backdoor on all the accounting workstation in order to inject transactions in the payment system.
  • Case B – Worm inside the information system
    • In this scenario, the information system was breached by a common malware send through phishing. Besides quarantine in place, due to a simple mistake of an operator with privileged access, the malware had wormed through the entire information system. The incident response investigations where complex to perform due to other simple mistakes in log management.
  • Case C – Ransomware Attack
    • In this scenario, the information system was breached by the exploitation of a vulnerability on the remote access month’s ago. The attacker took control of the Information system; exfiltrated data then deploy a ransom attack over the entire infrastructure. Finally, he published publicly the stolen data.

REQUIREMENTS

To perform this activity, the client must attend to the training. The list of the participants should be communicated to Excellium one week before the training.

CONTACT

About Instructors

Paul Jung
Paul Jung is since a long time a security enthusiast. He possesses a wide range of skills and experiences that enable him to perform multiple roles from offensive security audit to security incident handling.

Free

Duration: 2.5 hours

Contact

  • Excellium : 5 rue Goell L-5326 Contern or Oxiane 20, rue de l’Industrie – L – 8399 Windhof (Koerich)
  • +352 26 20 39 64 or Oxiane +352 27 39 35 1
  • training@excellium-services.com
Copyright © 2017 Excellium University
Mentions légales
Privacy Statement
  • Home
  • About Us
  • Courses
  • Contact Us
  • Blog
Search