SANS SEC504 Course Resources

SANS SEC504 Course Resources

Instructor Contact Information

Anurag Khanna
Director, Incident Response and Consulting @CrowdStrike

(Let’s connect! Please mention you’re in class)

Course Schedule

  • DAY 1 - 09:00 to no later than 19:15 (includes Linux Olympics Bootcamp)
  • DAY 2-5 - 09:00 to 17:00-17:30ish
  • DAY 6 - 09:00 to no later than 15:00 (probably earlier)
  • Breaks - 10:30-10:50, 12:15-13:00 (lunch), 15:00-15:20

Courseware

  • Books labeled 504.1-504.6 (one book per day)
  • ISO image: 504.22.X.iso
  • MP3 recordings available via SANS Portal
  • Video recordings of each lab on ISO image

Laptop Requirements

SANS SEC504 Laptop Requirements
(Important laptop requirements can be found here. Ask if you have questions…)

Event Information

Social Media


Key Resources

SEC504 Resources


Online Learning Resources

Linux Learning

Understanding Attacks

Windows Event Logs


Information Security News

News Sources


Intelligence & Resources

Intelligence Resources

Threat Intelligence & OSINT

Vulnerability Management

Security Blogs


Podcasts


Practice Labs

Lab Building Resources

Practice Platforms

Additional Training & Certifications


Entertainment


Microsoft Resources

Microsoft Ninja Hub


The DFIR Report

StellarParticle/NOBELIUM/UNC2452/SUNBURST

Lockbit

LightBasin

FIN13


Nation-State Threat Actors - The Big Four

🇷🇺 Russia

Void Blizzard (aka LAUNDRY BEAR)

🇨🇳 China (PANDA)

🇰🇵 North Korea

🇮🇷 Iran (🐈 Kitten)

DPRK Deep Dive

Famous Chollima (aka Jasper Sleet)

Silent Chollima


eCrime Actors

SCATTERED SPIDER (UNC3944/Octo Tempest/Muddled Libra)

Research Reports

CrowdStrike Analysis

Microsoft Analysis

Additional Resources

LAPSUS$

VMware Targeting


War Stories & Case Studies

Ransomware Studies

Breach Reports

MITRE Case Studies


Hardening & Defense Guidelines

Protection Strategies

  • Ransomware Protection and Containment Strategies (in Sec504-Share)
  • Proactive Preparation and Hardening to Protect Against Destructive Attacks (in Sec504-Share)
  • Linux Endpoint Hardening to Protect Against Malware and Destructive Attacks (in Sec504-Share)
  • Defending Against Identity Attack Techniques

Playbooks & Recovery Guidance

Microsoft Resources

Specific Playbooks


Day-Specific Resources

Day 1 - Memory Forensics

Digital Forensics & Incident Response Tools

Ransomware & Malware Analysis

Cloud Investigation

Cloud Security

Day 2 - Reconnaissance

Day 3 - Password Attacks

Password Resources

Windows Security

Cloud Enumeration

Day 4 - Web Application Attacks

Day 5 - Post-Exploitation

Endpoint Security Bypass

Pivoting & Lateral Movement

Tunneling Tools

Persistence

Evidence Destruction

C2 Channels

Network Analysis

Network Security & Monitoring

Threat Hunting


Government & Industry Resources