Syllabus: AIT 673 - Cyber Incident Handling/Response: Term: Spring 2018
Syllabus: AIT 673 - Cyber Incident Handling/Response: Term: Spring 2018
E-mail: jholcom9@gmu.edu
Credits: 3
Textbooks (Required):
Jason Luttgens, Matthew Pepe, and Kevin Mandia, Incident Response &
Computer Forensics, Third Edition, McGraw-Hill Education; 3rd Edition
(August 8, 2014). ISBN: 978-0071798686
(http://www.amazon.com/Incident-Response-Computer-Forensics-Edition/dp/0071798684/)
Other Resources:
Paper readings and Internet resources posted on Blackboard -- AIT 673 Course
Course Goals:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common
threat vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of
compromised systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Course Expectations:
1. Graduate education requires dedication and organization. Proper preparation is expected
every week. You are expected to log into our Blackboard course each week and complete
any assignments and activities on or before the due dates.
2. Students must check their GMU email messages on a daily basis for course
announcements, which may include reminders, revisions, and updates.
3. It is expected that you will familiarize yourself with and adhere to the Honor Code.
(http://oai.gmu.edu/the-mason-honor-code-2/) Student members of the George Mason
University community pledge not to cheat, plagiarize, steal, and/or lie in matters related to
academic work.
4. It is essential to communicate any questions or problems to me promptly.
Learning Community:
This course is supported via Blackboard Courses
(Log into http://mymason.gmu.edu select the Courses Tab, and the course can be
found in the Course List).
Grading policy:
Grades will be determined based on the following:
97 – above A+ Passing
93 – 96% A Passing
90 – 92% A- Passing
87 – 89% B+ Passing
83 – 86% B Passing
77 – 82% B- Passing
70 – 76% C Passing
0 – 69% F Failing
The report and presentation will be given during our final two sessions.
Preparation/Discovery Section
Week 1: Introduction to Incident Response and Handling -- CIRT/CERT Overview
Objective: Develop an understanding of the purpose of a Computer Emergency Response
Team (CERT), why an organization needs a CERT, composition of a CERT team, and the
incident response life cycle.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: NIST Special Publication 800-100 (March 2007), Chapter 13
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 2
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, 2nd Edition (October 2016), Chapter 2.2
• Review: Handbook for Computer Security Incident Response Teams (CSIRTs),
CMU/SEI 2nd Edition (April 2003), Pages 9 – 42
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 2: Incident Response Team and Case Study #1
Objective: Analyze the pre-incident preparation required by an incident response team and the
organization. Identify key areas of the organization, incident response team, and corporate
infrastructure needed to develop for a successful incident response capability.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014), Chapter 3,
and Case Study #1
• Read: Mandiant, Incident Response Retainers, see Week 2 Weekly Module in Blackboard
• Review: NIST Special Publication 800-61 Revision 2 (August 2012), Chapter 2
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 2 Assignment:
• Hands-on Activity (Not graded) – in-class activity supporting incident
handling/response actions, cyber tools, and processes we have been
discussing
Honor Code:
All work performed in this course will be subject to the GMU’s Honor Code.
(http://oai.gmu.edu/the-mason-honor-code-2/) Any violation will be reported to the honor
committee.
Academic Integrity:
GMU is an Honor Code university; please see the Office for Academic Integrity
(http://academicintegrity.gmu.edu/honorcode/) for a full description of the code and the
honor committee process. The principle of academic integrity is taken very seriously
and violations are treated gravely. What does academic integrity mean in this course?
Essentially this: when you are responsible for a task, you will perform that task. When
you rely on someone else’s work in an aspect of the performance of that task, you will
give full credit in the proper, accepted form. Another aspect of academic integrity is the
free play of ideas. Vigorous discussion and debate are encouraged in this course, with
the firm expectation that all aspects of the class will be conducted with civility and
respect for differing ideas, perspectives, and traditions. When in doubt (of any kind)
please ask for guidance and clarification.