17.05 - DNS Security Training with Infoblox

/ Événements

DNS for Security Practitioners Training Session 17th of May - (ISC)² CPE eligible!


We are delighted to invite you to an instructor-led security training course, DNS for Security Practitioners together with a breakfast buffet


17th of May 2022


At the Warwick Hotel in Geneva (close to the train station).

The course is:

  • (ISC)² CPE eligible,
  • help you understand how DNS is abused by attackers to compromise network security
  • provide the knowledge and techniques to help you mitigate those risks.


Please note: this course is vendor-agnostic and is not a product training or a configuration class. The aim of this Security training is to provide new insights and inspiration for security professionals.






08:30 - 12:00: Breakfast Buffet

08:30 - 10:00:      The role of DNS in today's cyber attacks - In-depth analysis of the techniques used by hackers - with real examples!

      • Cyber Kill Chain
      • DGA (Domain Generating Algorithm)
      • DNS Data Exfiltration/Infiltration/Tunneling
      • Malware and C2 Communication

The importance of threat intelligence: passive DNS, partner threat intelligence, etc. How DNS is used in zero-day phishing campaigns and how to protect against it

      • Lookalike Domains
      • New Domains
      • Cyber Security Frameworks
      • log4j

10:00 - 10:20: Break

10:20 - 12:00:

  • How machine learning and behavioral analytics are critical to responding to advanced attack vectors that use DGAs and DNS as a means of communication
  • How DNS, DHCP and IPAM data can be used to perform security orchestration, automation and response (SOAR)
  • How advanced malware leverages new techniques such as DNS to bypass security via HTTPS and use command and control


After this training, you will have a deep understanding of:

  • The role of DNS in today’s cyberattacks – deep analysis of techniques used by hackers - real examples provided!
  • The importance of Threat Intelligence: passive DNS, partner threat Intelligence etc.
  • How DNS is leveraged in zero-day phishing campaigns and how to protect against them
  • How machine learning and behavioural analytics is crucial in responding to advanced attack groups who utilize DGA’s and DNS as communication tool;
  • How DNS, DHCP and IPAM data can be used to perform Security Orchestration, Automation and Response (SOAR)
  • How advanced malware uses new techniques such as DNS over HTTPS for bypassing security infrastructure and command and control traffic;