17.05 - DNS Security Training with Infoblox
DNS for Security Practitioners Training Session 17th of May - (ISC)² CPE eligible!
We are delighted to invite you to an instructor-led security training course, DNS for Security Practitioners together with a breakfast buffet
17th of May 2022
At the Warwick Hotel in Geneva (close to the train station).
The course is:
- (ISC)² CPE eligible,
- help you understand how DNS is abused by attackers to compromise network security
- provide the knowledge and techniques to help you mitigate those risks.
Please note: this course is vendor-agnostic and is not a product training or a configuration class. The aim of this Security training is to provide new insights and inspiration for security professionals.
08:30 - 12:00: Breakfast Buffet
08:30 - 10:00: The role of DNS in today's cyber attacks - In-depth analysis of the techniques used by hackers - with real examples!
- Cyber Kill Chain
- DGA (Domain Generating Algorithm)
- DNS Data Exfiltration/Infiltration/Tunneling
- Malware and C2 Communication
The importance of threat intelligence: passive DNS, partner threat intelligence, etc. How DNS is used in zero-day phishing campaigns and how to protect against it
- Lookalike Domains
- New Domains
- Cyber Security Frameworks
10:00 - 10:20: Break
10:20 - 12:00:
- How machine learning and behavioral analytics are critical to responding to advanced attack vectors that use DGAs and DNS as a means of communication
- How DNS, DHCP and IPAM data can be used to perform security orchestration, automation and response (SOAR)
- How advanced malware leverages new techniques such as DNS to bypass security via HTTPS and use command and control
After this training, you will have a deep understanding of:
- The role of DNS in today’s cyberattacks – deep analysis of techniques used by hackers - real examples provided!
- The importance of Threat Intelligence: passive DNS, partner threat Intelligence etc.
- How DNS is leveraged in zero-day phishing campaigns and how to protect against them
- How machine learning and behavioural analytics is crucial in responding to advanced attack groups who utilize DGA’s and DNS as communication tool;
- How DNS, DHCP and IPAM data can be used to perform Security Orchestration, Automation and Response (SOAR)
- How advanced malware uses new techniques such as DNS over HTTPS for bypassing security infrastructure and command and control traffic;