If you’re a newer analyst like me and have been trying to cram everything into your brain at once…or if you’re looking at all this free training wondering where to even start (after you have an understanding of the four core categories), I saw this video and attempted to make a free training plan from it.
This is based on Ryan Chapman’s BSidesSF 2019 – Implementing a Kick-Butt Training Program: BLUE TEAM GO! Talk
Check out his GitHub for the PDFs.
Before starting Week 1, I recommend taking Intro to DFIR: The Divide and Conquer Process by Basis Technology
Obviously Days 1-3 can’t be done here so I’m skipping to Day 4 & 5.
SIEM Training (This will depend on what SIEM you’re using but you can also practice in a home lab if you’re following this before you get your first IR job)
Splunk – There are Free Splunk Courses by Splunk and a free Splunk Module on the RangeForce Free Community Edition. Sam Bowne also has a Network Security Monitoring course using Splunk. In addition, there is an Introduction to Spunk Workshop by Kenneth Ellington.
SIEM tutorials by I.T Security Labs – There are many tutorials on their YouTube channel for different open-source SIEMs. Set one up, or play around with a few.
Try the Splunk Boss of the SOC Challenges on CyberDefenders.
Day 1: Common Protocols and How They Work
- Email Protocols
Day 2: Network Logs
Get Hands-On with the Free Version of LetsDefend (SOC Simulation Environment)
Do the Hammered – Log Analysis Challenge on CyberDefenders
Day 3 & 4: Email
Hands-On Computer Security & Incident Response – Email Header Analysis
Day 5: Wireshark & PCAP Challenge
Wireshark for Incident Response & Threat Hunting Workshop the lab files are HERE
Do The Malware Traffic Analysis PCAP Challenges on CyberDefenders
Day 1: Windows Artifacts
Introduction to Evidence Acquisition by Cyber 5W
Introduction to Windows Forensics (start this)
Day 2: Registry Analysis cont.
Introduction to Windows Forensics (complete this)
Try the “CorporateSecrets – Windows Forensics” Challenge on CyberDefenders
Day 3: Corporate Forensics Tool(s)
Here are some of them:
Encase – Guidance Software YouTube Channel
Axiom – Magnet Forensics YouTube Channel
Paraben – Free Paraben Training Videos
Autopsy – How to Start a New Case in Autopsy 4
Day 4: Eric Zimmerman Tools
Day 5: Memory Analysis Deep Dive
Try Some Challenges:
Days 1 & 2: PDF Analysis, Office File Analysis
Try the MalDoc101 – Malicious Document Challenge on CyberDefenders
Day 3 and 4: Dynamic & Static PE Analysis
Day 5: Sam’s Malware Workshop
There is also a Malware Noob2Ninja Course by 0xf0x
Go to TryHackMe Hacktivies, Select “Show: Free Only” and do a search for “Malware” for some malware challenges.
Day 1: IOCs
Do the YARA modules on the RangeForce Free Community Edition
Day 2: Threat Hunting
AttackIQ Academy (There is a free MITRE ATT&CK for Dummies ebook and all of their courses are free) Select the MITRE ATT&CK Learning Path for now.
Day 3: Operationalizing OSINT
OSINT Training (Includes Detecting Malicious Domains or IPs with OSINT)
Day 4: Working Tickets
This is going to vary by company, but if you haven’t started in Incident Response yet, here is a video about The Hive, a free and open-source ticketing system that can be set up in your home lab.
Day 5: Review & Wrap-Up
Writing a Forensics Report by Cyber 5W
For more hands-on learning, sign up for the Free Community Edition of RangeForce and work through the SOC Module. There is also a Microsoft Module with Windows Event Logs.
To put it all together, go through The Case of the Stolen Szechuan Sauce on DFIR Madness.