Tracking the Threat Landscape

Upon completing this course, participants will develop a comprehensive skill set that enables them to meticulously identify and scrutinize failed login attempts, highlighting the importance of recognizing potential unauthorized access that could lead to security breaches. They will also gain proficiency in executing port scans, a critical measure in pinpointing and mitigating open ports to prevent exploitation. Furthermore, learners will master the correlation of firewall events within a SIEM system, a key skill in piecing together disparate security data to unveil and understand ongoing security threats. Lastly, the ability to succinctly document and articulate cybersecurity incidents will be honed, ensuring participants can convey incident specifics effectively, a vital component in fostering a responsive and adaptive security operations environment.

Overview

Welcome to the second lab in our series of practical, hands-on exercises designed to provide real-world experience in a security operations environment. Building upon the foundational skills developed in the first lab, this session will delve deeper into the critical aspects of security operations. You will engage in tasks such as reviewing failed login attempts to understand their significance in identifying potential security breaches. In addition, you'll perform web vulnerability scans to identify weaknesses in web applications, correlate firewall events within a security information and event management (SIEM) to ongoing security incidents, and document an incident by summarizing it and entering the details into a ticketing system. Each task is designed to enhance your analytical skills and deepen your understanding of operational security measures, preparing you for the complexities of working in a dynamic security operations center.

The second lab covers four crucial tasks:

Reviewing Failed Login Attempts: vital for identifying unauthorized access attempts, indicative of potential security breaches or brute force attacks.

Vulnerability Scanning: Performing web vulnerability scans helps in identifying weaknesses in web applications, crucial for preventing exploits.

Correlating Firewall Events in a SIEM: essential for understanding the context of security alerts and identifying ongoing security threats by relating firewall events to other security data.

Documenting an Incident: summarizing and recording incidents accurately is crucial for effective incident response and ensuring accountability and improvement in security measures.

Key terms and descriptions

Brute Force Attack
A trial-and-error method used by attackers to decode encrypted data such as passwords or Data Encryption Standard (DES) keys through exhaustive effort rather than employing intellectual strategies
Port Scan
The process of using automated software to scan a network of systems for open ports to identify security holes within the network
Firewall Events
Records generated by network firewalls that capture the details of suspicious or potentially harmful activity, helping in monitoring and securing network traffic
Security Information and Event Management (SIEM)
A comprehensive solution that aggregates, analyzes, and reports on security data from various sources, facilitating real-time detection, containment, and remediation of security threats
Incident Documentation
The detailed recording of information about a security incident, including its nature, status, and resolution, crucial for post incident analysis and compliance purposes.