Introduction
  • Welcome & Intro
  • Set your expectations
  • A 1st touch of what you will really get in the course
  • My first promise to you - get certified in less than 30 days: CIPT, CIPM, CIPP/E
  • Presentations (ppt)
  • One more word before we start
Incident Response in CyberSecurity
  • What is Incident Response and why do I need it?
  • Incident Response Team
  • Incident Response Process and Procedures
  • Types of Security Incidents
  • Incident Response Tools - general
  • What is a SIEM?
  • Incident Response Training
  • What is automation in incident response
Building a Security Operations Center (SOC)
  • What is a NOC?
  • What is a SOC?
  • Integrated NOC and SOC
  • Mission, Team and Required Training
  • Types of SOC
  • Building a SOC
  • Cheat Sheets to help you in configuring your systems
GDPR and Incident Response
  • GDPR intro
  • GDPR effects on Incident Response
  • How to create an effective IR plan
  • GDPR Incident Response Process
  • Lets draft the IRM Procedure
  • How to treat data breaches
GDPR Incident Response Methodologies (IRM)
  • IRM1 - Worm Infection
  • IRM2 - Windows Intrusion
  • IRM3 - Unix/Linux Intrusion Detection
  • IRM4 - DDoS
  • IRM5 - Malicious Network Behaviour
  • IRM6 - Website Defacement
  • IRM7 - Windows malware detection
  • IRM8 - Blackmail
  • IRM9 - SmartphoneMalware
  • IRM10 - Social Engineering
  • IRM11 - Information Leakage
  • IRM12 - Insider Abuse
  • IRM13 - Phishing
  • IRM14 - Scam
  • IRM15 - Ransomware
Incident Response Tools for GDPR compliance - free vs enterprise
  • Lessons learned by working in a SOC
  • A list of open source tools to use
  • Windows Defender ATP
Banking challenges related to cyber risk
  • Today Challenges
  • Target and Distribution
  • Attack Methods
  • Infection vectors
  • Targeted attacks against financial institutions
  • Mobile platform and email scams
  • Takedowns and Conclusions
Financial Malware history with examples
  • Past 3 decades of malware (part 1)
  • Past 3 decades of malware (part 2)
  • The architecture of financial malware
  • Zeus
  • Zeus GameOver
  • SpyEye
  • IceIX
  • Citadel
  • Carberp
  • Shylock
  • Bugat
  • Dyre
  • Dridex
  • Shifu
  • Tinba
Making a business case for Financial Malware
  • Why Fraud Risk Engines fail
  • How to bypass 2 factor authentication (2FA)
  • Fraud Prevention Technology
  • Compliance and Legal Issues
  • Customer impact
  • Selecting the right cybercrime solution
  • Malware detection
  • Malware detection - advanced
  • Malware detection - how technology can help
  • Criminal Detection & Account Takeover
  • What about mobile banking?
Some simple hacking attempts - demo
  • Lab setup
  • XSRF attack
  • Compromising Public server
  • Break-In: Compromising the victim computer
  • Other Web Application Attack Example
  • Locky Ransomware
  • Gathering Info & Exfiltrate
Conclusion
  • Final thoughts and other documents
  • BONUS - Remember my first promise to you - get certified in less than 30 days?
  • BONUS 2 - How to get more content and help me create more!