Catalog > All Topics

Continuous Monitoring and Security Operations (CMSO)

EC Council
  • Course Summary
  • Schedule
6 Days
Download Course Outline
Call for price
Request a Quote
Credit not applicable
Share
Schedule
Export to CSV
  • No schedule events found for this course.
      • PC
        Private Class
        Privately train a group of your employees at your facility, virtually, or any of our locations.
    Request
  • LCLive Classroom
    Live Classroom
    Learn and interact with your instructor and peers in-person in our classrooms.
  • VCVirtual Classroom
    Virtual Classroom
    Attend any of our instructor-led classes virtually regardless of your physical location.
  • PCPrivate Class
    Private Class
    Privately train a group of your employees at your facility, virtually, or any of our locations.
  • GTRGuaranteed to Run
    Guaranteed to Run
    GTR classes are guaranteed to run as promised and delivered.
Course Summary
Show All

Description

n/a

Objectives

• Analyze modern hybrid enterprises for deficient protection/detection strategies

• Apply the principles learned in the course to design a defensible cloud, network, and endpoint security architecture and operations

• Understand the importance of detection-dominant security architecture and Security Operations Centers (SOC) for hybrid enterprises

• Identify the key components of cloud, network, and endpoint protection and monitoring across hybrid infrastructure

• Determine appropriate security monitoring needs for organizations of all sizes

Outline

Current State Assessment and Security Architecture

Exercises

o Detecting Traditional Attack Techniques with Security Onion and CyberChef

o Detecting Modern Attack Techniques with Security Onion

o Egress Analysis with Elastic Stack

o NetWars (Day 1): Immersive Cyber Challenges

Topics

o Traditional Security Architecture

• Perimeter-focused

• Addressed Layer 3/4

• Centralized Information Systems

• Prevention-Oriented

• Device-driven

• Traditional Attack Techniques

o Introducing Security Onion 2.X

• Alerts Menu

• Pivoting to the Hunt Menu

• The PCAP Menu

o Modern Security Architecture Principles

• Detection-oriented

• Post-Exploitation-focused

• Decentralized Information Systems/Data

• Risk-informed

• Layer 7 Aware

• Security Operations Centers

• Network Security Monitoring

• Continuous Security Monitoring

• Modern Attack Techniques

• Adversarial Dominance 

• MITRE ATTACK(R)

o Security Architecture - Key Techniques/Practices

• Threat Vector Analysis

• Data Exfiltration Analysis

• Detection Dominant Design

• Intrusion Kill Chain

• Visibility Analysis

• Lateral Movement Analysis

• Data Ingress/Egress Mapping

• Internal Segmentation

• Network Security Monitoring

• Continuous Security Monitoring

o Cloud Deployment Models 

• Cloud Shared Responsibilities

• Infrastructure as Code (IaC)

• Overexposed Cloud Services: Leaky Buckets

• Cloud Network Visibility

o MITRE ATT&CK(R) & AWS Security Stack

• AWS Security Hub

• AWS Identity and Access Management (IAM)

• AWS CloudTrail

• Amazon CloudWatch

• AWS Firewall Manager

• AWS WAF + AWS Shield

• Amazon Virtual Private Cloud (VPC)

• Amazon GuardDuty

• Amazon Inspector

• Amazon Macie

Network Security Architecture

Exercises

o ModSecurity o Decrypting TLS with Wireshark

o Detecting Adversaries with Protocol Inspection

o HoneyTokens for Leak Detection

o NetWars (Day 2): Immersive Cyber Challenges

Topics

o SOCs/Security Architecture - Key Infrastructure Devices

• Traditional and Next- Generation Firewalls, and NIPS

• Web Application Firewall

• Malware Detonation Devices

• HTTP Proxies, Web Content Filtering, and SSL/TLS Decryption

• SIEMs, NIDS, Packet Captures, and DLP

• Honeypots/Honeynets

• Network Infrastructure - Routers, Switches, DHCP, DNS

• Threat Intelligence

o Segmented Internal Networks

• Routers

• Internal SI Firewalls

• VLANs

• Detecting the Pivot

• DNS architecture

• Encrypted DNS including DNS over HTTPS (DoH) and DNS over TLS (DoT)

o Defensible Network Security Architecture Principles Applied

• Internal Segmentation

• Threat Vector Analysis

• Data Exfiltration Analysis

• Detection Dominant Design

• Zero Trust Architecture (Kindervag)

• Intrusion Kill Chain

• Visibility Analysis

• Data Visualization

• Lateral Movement Analysis

• Data Ingress/Egress Mapping

Network Security Monitoring

Exercises

o Pcap Carving with Zeek

o Security Onion Service-Side Attack Analysis

o Wireshark Merlin Analysis

o Detecting TLS Certificate and User-Agent Anomalies

o NetWars (Day 3): Immersive Cyber Challenges Labs

Topics

o Evolution of NSM

o The NSM Toolbox

o NIDS Design

o Analysis Methodology

o Understanding Data Sources

• Full Packet Capture

• Extracted Data

• String Data

• Flow Data

• Transaction Data

• Statistical Data

• Alert Data

• Tagged Data

• Correlated Data 

o Cloud NSM

o Practical NSM Issues

o Cornerstone NSM

• Service-Side and Client-Side Exploits

• Identifying High-Entropy Strings

• Tracking EXE Transfers

• Identifying Command and Control (C2) Traffic

• Tracking User Agents 

• C2 via HTTPS

• Tracking Encryption Certificates

• Detecting Malware via JA3

o Detecting Cobalt Strike

• Criminal Usage of Cobalt Strike

• Malleable C2

• Cobalt Strikes x.509 Certificates

Endpoint Security Architecture

Exercises

o Sysmon

o Autoruns

o Application Control with AppLocker

o Merlin Sysmon Analysis

o NetWars Day 4: Immersive Cyber Challenges

Topics

o Endpoint Security Architecture

• Endpoint Protection Platforms

• Endpoint Detection Response

• Authentication Protection/Detection

• Configuration Management/Monitoring

o Endpoint Protection

• TPM: Device Health Attestation

• Host-based Firewall, Host-based IDS/IPS

• Application Control, Application Virtualization

• Virtualization Based Security 

• Microsoft Defender: Application Guard

• Windows Defender: Credential Guard

• Defender for Endpoint: Attack Surface Reduction

• EMET and Defender Exploit Guard

o Cloud Configuration Management

o Endpoint Detection - Sysmon

• FileDelete, ProcessTampering, and other recent additions

• IMPHASH

• DeepBlueHash

o Authentication Protection and Detection

• Privileged Account Monitoring

• Windows Hello

• Dynamic Lock 

• PIN-Only Authentication

• Passwordless

• Azure Active Directory + MFA

• Azure Authentication Methods

• AAD Conditional Access

• Hash/Ticket/Token Attacks

o Configuration Management/Monitoring

• Cloud: Center for Internet Security (CIS) Hardened Images

• Containers: CIS Hardened Images for Containers

• Baseline Monitoring

• Desired State Configuration (DSC)

• Azure Automation State Configuration

Automation and Continuous Security Monitoring

Exercises

o Inventory

o Windows Event Logs

o DNS over HTTPS (DoH)

o Kansa Persistence and Pivoting

o NetWars (Day 5): Immersive Cyber Challenges 

Topics

o Overview

• Continuous Security Monitoring (CSM) vs. Continuous Diagnostics and Mitigation (CDM) vs. Information Security Continuous Monitoring (ISCM)

• Cyberscope and SCAP

o Industry Best Practices

• Continuous Monitoring and the 20 CIS Critical Security Controls

• Australian Signals Directorate (ASD) Strategies to Mitigate Targeted Cyber Intrusions

o Winning CSM Techniques

• Long Tail Analysis

• Australian Signals Directorate (ASD) Strategies to Mitigate Cyber Security Incidents

• The ASD Essential Eight 

o Maintaining Situational Awareness

o Host, Port, and Service Discovery

o Vulnerability Scanning

o Monitoring Patching

o Monitoring Applications

o Monitoring Service Logs

• Detecting Malware via DNS logs

• Detecting DNS Tunneling via Iodine and dnscat2

• Domain_stats and Registration Data Access Protocol (RDAP)

o Monitoring Change to Devices and Appliances

o Leveraging Proxy and Firewall Data

o Configuring Centralized Windows Event Log Collection

o Monitoring Critical Windows Events

• Hands-on: Detecting Malware via Windows Event Logs

o Scripting and Automation

• Importance of Automation

• PowerShell

• DeepBlueCLI o Security Operations Center (SOC)

• Purpose of a SOC

• Key SOC roles

• Relationship to Defensible Security Architecture 

Capstone: Design, Detect, Defend

Topics

o Security Architecture

o Continuous Security Monitoring

o Applied NSM and CSM

o Analyzing Malicious Traffic with Security Onion, Wireshark, and CyberChef

o Analzying Malicious Windows Event Logs

o Packet Analysis

o Log Analysis

o C2 Detection

POPULAR LINKS
  • Course Catalog
  • Guaranteed to Run
  • Special Offers
  • Services
  • Student Services
  • Solutions
ABOUT
  • Company
  • News
  • Events
  • Contact Us
Skyline ATS
Corporate Headquarters
2148 Bering Drive
San Jose, CA 95131
  • 408-340-9800
  • 408-340-9800
Connect With Us
©2026 Skyline Advanced Technology Service
  • Policies
  • Privacy