0% found this document useful (0 votes)
77 views12 pages

Syllabus: AIT 673 - Cyber Incident Handling/Response: Term: Spring 2018

This document outlines the syllabus for the course AIT 673 - Cyber Incident Handling/Response taught in Spring 2018. The course will examine Computer Emergency Response Teams and teach skills related to incident response, vulnerability assessment, incident analysis, malware analysis, forensics, and investigations. Students will complete current event papers, in-class labs, a team case study paper, and a team project and presentation on developing an incident response capability for a critical infrastructure organization. The course goals are to teach incident handling skills, defenses against threats, experience with analysis tools, and current knowledge in the field.

Uploaded by

ggcvbc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views12 pages

Syllabus: AIT 673 - Cyber Incident Handling/Response: Term: Spring 2018

This document outlines the syllabus for the course AIT 673 - Cyber Incident Handling/Response taught in Spring 2018. The course will examine Computer Emergency Response Teams and teach skills related to incident response, vulnerability assessment, incident analysis, malware analysis, forensics, and investigations. Students will complete current event papers, in-class labs, a team case study paper, and a team project and presentation on developing an incident response capability for a critical infrastructure organization. The course goals are to teach incident handling skills, defenses against threats, experience with analysis tools, and current knowledge in the field.

Uploaded by

ggcvbc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber Incident Handling/Response AIT673

Syllabus: AIT 673 - Cyber Incident Handling/Response


Term: Spring 2018

Instructor: Jay Holcomb, Adjunct Faculty, Department of Information Sciences and


Technology, Volgenau School of Engineering

GMU Website: http://mason.gmu.edu/~jholcom9/

E-mail: jholcom9@gmu.edu

Course: AIT 673 -- Cyber Incident Handling/Response


Examines Computer Emergency Response Team (CERT), including Incident Response,
Vulnerability Assessment, Incident Analysis, Malcode Analysis, Forensics and Investigations.
Includes exercises in CERT operations and a final Incident Handling project.

Credits: 3

Day/Time: Wednesday, 7:20pm – 10:00pm


Where: Thompson Hall Room: 1018

Textbooks (Required):

Jason Luttgens, Matthew Pepe, and Kevin Mandia, Incident Response &
Computer Forensics, Third Edition, McGraw-Hill Education; 3rd Edition
(August 8, 2014). ISBN: 978-0071798686
(http://www.amazon.com/Incident-Response-Computer-Forensics-Edition/dp/0071798684/)

Don Murdoch, Blue Team Handbook: Incident Response Edition: A


condensed field guide for the Cyber Security Incident Responder,
CreateSpace Independent Publishing Platform; 2.2 edition (October 2016),
ISBN: 978-1500734756

Other Resources:
Paper readings and Internet resources posted on Blackboard -- AIT 673 Course

Version 2.2a Page 1 of 12 Spring 2018


Cyber Incident Handling/Response AIT673

Course Goals:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common
threat vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of
compromised systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.

Course Expectations:
1. Graduate education requires dedication and organization. Proper preparation is expected
every week. You are expected to log into our Blackboard course each week and complete
any assignments and activities on or before the due dates.
2. Students must check their GMU email messages on a daily basis for course
announcements, which may include reminders, revisions, and updates.
3. It is expected that you will familiarize yourself with and adhere to the Honor Code.
(http://oai.gmu.edu/the-mason-honor-code-2/) Student members of the George Mason
University community pledge not to cheat, plagiarize, steal, and/or lie in matters related to
academic work.
4. It is essential to communicate any questions or problems to me promptly.

Learning Community:
This course is supported via Blackboard Courses
(Log into http://mymason.gmu.edu select the Courses Tab, and the course can be
found in the Course List).

Each week begins on Monday and ends on Sunday.

In our online learning community, we must be respectful of one another. Please be


aware that innocent remarks can be easily misconstrued. Sarcasm and humor can be
easily taken out of context. When communicating, please be positive and diplomatic!

Version 2.2a Page 2 of 12 Spring 2018


Cyber Incident Handling/Response AIT673

Grading policy:
Grades will be determined based on the following:

Grade Component Weight

Current Cyber Event Paper #1 10%


Current Cyber Event Paper #2 10%
In-class Labs or Alternate Assignments (5 @
25%
5%)
Team Paper -- Case Study #2 15%
Team Project and Presentation 30%
Class Participation 10%
Total: 100%

The grading scale for this course is:

Numeric Grade Letter Grade Status

97 – above A+ Passing

93 – 96% A Passing
90 – 92% A- Passing
87 – 89% B+ Passing
83 – 86% B Passing
77 – 82% B- Passing
70 – 76% C Passing
0 – 69% F Failing

Version 2.2a Page 3 of 12 Spring 2018


Cyber Incident Handling/Response AIT673

Current Cyber Event Papers (2 @ 10% each = 20%):


Select a recent cyber event - research the event using open source references - then
write an executive-level technical brief on the event. Include the following as a
minimum: threat vector used, vulnerability attacked, incident response actions taken,
your recommended mitigations, business impact of this event. The length of this paper
should be one page - maximum of two pages. (One page is a single side of paper) On
a separate page include your open source references - minimum of two (2) unique
sources are required.
In-class Labs/Alternate Assignments (5 @ 5% = 25%):
Five (5) labs supporting incident handling/response actions, attack vectors, and network
defense options.
If unable to complete an in-class lab – a written Internet researched paper assignment
may be completed. (Must be completed within 2 weeks of the lab for credit.)
Team Paper -- Case Study #2 (15%): (Five teams of 5 people each)
Using Case Study #2 (Chapter 1, page 15) build a high-level remediation plan outline and
answer four (4) incident response remediation questions.
Team Project and Presentation (30%): (Five teams of 5 people each)
Incident response team -- select a fictitious critical infrastructure sector company and create a
senior executive (CISO/CIO) level report, with accompanying executive briefing, highlighting
why your company needs an internal CIRT/CERT team or why it should outsource the
CIRT/CERT capability.
At a minimum cover what will happen when your company is hit with malicious software, or a
breach, describing a potential Company incident in great detail. Include how your
recommended CIRT/CERT team will approach/engage, processes they will use, tools (software
and hardware) that you expect them to have/use, timing and potential business impacts,
estimated incident costs (to include potential CIRT/CERT team set-up and team O&M), team
skills needed with estimated costs, and the [critical] reporting processes.
The length of the report should be less than 45 pages. (One page is a single side of paper /
double-spaced) On a separate attachment include your open source references. (APA
formatting applies)

The report and presentation will be given during our final two sessions.

Class Participation (10%):


Active participation in weekly lectures, labs, and team assignments

Version 2.2a Page 4 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
Course Schedule (Tentative):

Preparation/Discovery Section
Week 1: Introduction to Incident Response and Handling -- CIRT/CERT Overview
Objective: Develop an understanding of the purpose of a Computer Emergency Response
Team (CERT), why an organization needs a CERT, composition of a CERT team, and the
incident response life cycle.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: NIST Special Publication 800-100 (March 2007), Chapter 13
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 2
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, 2nd Edition (October 2016), Chapter 2.2
• Review: Handbook for Computer Security Incident Response Teams (CSIRTs),
CMU/SEI 2nd Edition (April 2003), Pages 9 – 42
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 2: Incident Response Team and Case Study #1
Objective: Analyze the pre-incident preparation required by an incident response team and the
organization. Identify key areas of the organization, incident response team, and corporate
infrastructure needed to develop for a successful incident response capability.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014), Chapter 3,
and Case Study #1
• Read: Mandiant, Incident Response Retainers, see Week 2 Weekly Module in Blackboard
• Review: NIST Special Publication 800-61 Revision 2 (August 2012), Chapter 2
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 2 Assignment:
• Hands-on Activity (Not graded) – in-class activity supporting incident
handling/response actions, cyber tools, and processes we have been
discussing

Version 2.2a Page 5 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
Preparation/Discovery Section cont’d
Week 3: Networking Security Monitoring and Indicators/Leads
Objective: Identify the types of networking monitoring an organization may implement
and explain the benefits for implementing network monitoring within an organization.
Define the value of a lead/indicator to an incident response team and follow-on value to
the larger organization.
Course Goal Connection:
• Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
• Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
• Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 5 and Chapter 9
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 5.1, 5.2, and 5.3
• Read: Mandiant, APT1 Exposing One of China’s Cyber Espionage Units -- see
Week 3 Weekly Module in Blackboard
• Read: Ponemon/IBM, 2017 Cost of Data Breach Study -- see Week 3 Weekly
Module in Blackboard
• Read: Ponemon/IBM, 2016 Cost of Data Breach Study -- see Week 3 Weekly
Module in Blackboard
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 3 Assignment:
• Current Cyber Event Paper #1
Week 4: Initial Incident Detection/Facts
Objective: Explain why initial facts in a potential incident are critical and how checklists
can help provide objectivity to a potential incident detection. Identify three checklists
that could assist the incident response team with objectivity regarding a potential
incident detection.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
4, Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read: Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 4
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 2.2, 2.11, and 2.12
• Read: FireEye -- APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE
OPERATIONS?

Version 2.2a Page 6 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
• Read: FireEye -- APT28 Targets Hospitality Sector, Presents Threat to Travelers «
Threat Research Blog
• Read: NIST Special Publication 800-61 Rev 2 (August 2012), Chapter 3: pg 21 - 34
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 4 Assignment:
• Lab #1 - hands-on lab supporting incident handling/response actions, attack
vectors, and network defense options and processes we have been
discussing
Data Collection/Analysis Section/Remediation
Week 5: Enterprise Services and Case Study #2
Objective: Identify at least five (5) enterprise network services that most organizations
implement. Explain the functions and benefits of these network services to an
organization and their importance to an incident response team.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read Incident Response & Computer Forensics, Third Edition, McGraw-Hill
Education; 3rd Edition (August 8, 2014), Chapter 10 and Case Study #2
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 5.10 and 5.11
• Read: Cisco – 2017 Annual Cybersecurity Report
• Read: Cisco – 2016 Midyear Cybersecurity Report
• Review Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 18
• Review: The Internet Assigned Numbers Authority (IANA) web site
(https://www.iana.org) and associated resources available on this web site.
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 5 Assignment:
• Hands-on Activity (Not graded) – in-class activity supporting incident
handling/response actions, cyber tools, and processes we have been
discussing
Week 6: Forensic Duplication and Hashing
Objective: Identify the three primary types of forensic images an incident response
team may create and differences between the three. Explain the process used to
create a forensic duplication. Describe what hashing is, why is important, and what
benefits it provides to the incident response team.
Course Goal Connection:

Version 2.2a Page 7 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 8 and Chapter 15 (pages 474 and 475)
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 6 Assignment:
• Lab #2 - hands-on lab supporting incident handling/response actions, attack
vectors, and network defense options and processes we have been
discussing
Data Collection/Analysis Section/Remediation cont’d
Week 7: Report Writing and Remediation
Objective: Explain why reporting writing is one of the most important functions of an
incident response team. Identify and analyze the eight (8) high-level steps which make-
up the incident response remediation process.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 16 and Chapter 17
• Review Incident Response & Computer Forensics, Third Edition, McGraw-Hill
Education; 3rd Edition (August 8, 2014), Chapter 18
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 7 Assignment:
• Team Paper -- Case Study #2
Week 8: Live Data Collection
Objective: Explain the primary purpose for live data collection. Identify at least five (5)
best practices for establishing a good process regarding live data collection. Compare
and contrast memory collection on Microsoft Windows and Unix/Linux based systems.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 7
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 5.3, 3.11, and 5.5
Other Reading (Recommended):

Version 2.2a Page 8 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 8 Assignment:
• Lab #3 -- hands-on lab supporting incident handling/response actions, attack
vectors, and network defense options and processes we have been
discussing
Analysis cont’d / Post Incident Section
Week 9: Analysis Methodology
Objective: Recommend a repeatable process to follow when preparing to gather and
analyze incident response related data.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 11
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 9 Assignment:
• Current Cyber Event Paper #2
Week 10: Investigating Applications (like Web Browsers/E-mail)
Objective: Explain the value of potential forensic evidence stored within user and
server applications. Describe what application data is and where it is stored. Analyze
web browser user data and the potential value of this data.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 14
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 7.1, 7.2, 7.3 and 7.4
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 10 Assignment:
• Lab #4 -- hands-on lab supporting incident handling/response actions, attack
vectors, and network defense options and processes we have been
discussing

Version 2.2a Page 9 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
Analysis cont’d / Post Incident Section cont’d
Week 11: Investigating Windows Systems
Objective: Identify the potential sources of incident response data on a Microsoft
Windows operating system. Explain the purpose and potential evidence that may be
found in the following areas; NTFS/File System, Prefetch, Event logs, Scheduled tasks,
and the Windows registry.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 12
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, Version 2.2 Update (October 2016)
Chapters 3.10 and 4.2
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 11 Assignment:
• Hands-on Activity (Not graded) – in-class activity supporting incident
handling/response actions, cyber tools, and processes we have been
discussing
Week 12: Investigating Mac OS X Systems
Objective: Identify the potential sources of incident response data on an Apple MC OS
X operating system. Explain the purpose and potential evidence that may be found in
the following areas; HFS+ file system, core operating system, Spotlight data, System
and application logs, and Application and system configurations.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 13
Other Reading (Recommended):
Paper readings and Internet resources posted on Blackboard -- AIT 673
Week 12 Assignment:
• Lab #5 -- hands-on lab supporting incident handling/response actions, attack
vectors, and network defense options and processes we have been
discussing
Week 13: Malware Triage
Objective: Identify at least three (3) steps to decrease the infection opportunity while
analyzing malware in a virtual environment and at least five (5) configuration/process
changes that can decrease the infection opportunity. Explain Static malware analysis

Version 2.2a Page 10 of 12 Spring 2018


Cyber Incident Handling/Response AIT673
and why it can be useful to an incident response team. Explain Dynamic malware
analysis and why it can be useful to an incident response team.
Course Goal Connection:
1. Obtain basic knowledge on dealing with system security related incidents.
2. Increase knowledge on potential defenses and counter measures against common threat
vectors/vulnerabilities.
3. Gain experience using tools and common processes in performing analysis of compromised
systems and dynamic malware analysis.
4. Obtain current knowledge of events and tools/support kits in the subject area.
Required Reading:
• Read Incident Response & Computer Forensics, 3rd Edition (August 8, 2014),
Chapter 15
• Read: Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder, 2nd Edition (August 3, 2014), Chapter 17
Other Reading (Recommended):
• Paper readings and Internet resources posted on Blackboard -- AIT 673 - Online
Course
Week 13 Assignment:
• Hands-on Activity (Not graded) – in-class activity supporting incident
handling/response actions, cyber tools, and processes we have been
discussing

Team Project Delivery/Presentation


Week 14: Team Reports and Presentations

Version 2.2a Page 11 of 12 Spring 2018


Cyber Incident Handling/Response AIT673

Honor Code:
All work performed in this course will be subject to the GMU’s Honor Code.
(http://oai.gmu.edu/the-mason-honor-code-2/) Any violation will be reported to the honor
committee.

Academic Integrity:
GMU is an Honor Code university; please see the Office for Academic Integrity
(http://academicintegrity.gmu.edu/honorcode/) for a full description of the code and the
honor committee process. The principle of academic integrity is taken very seriously
and violations are treated gravely. What does academic integrity mean in this course?
Essentially this: when you are responsible for a task, you will perform that task. When
you rely on someone else’s work in an aspect of the performance of that task, you will
give full credit in the proper, accepted form. Another aspect of academic integrity is the
free play of ideas. Vigorous discussion and debate are encouraged in this course, with
the firm expectation that all aspects of the class will be conducted with civility and
respect for differing ideas, perspectives, and traditions. When in doubt (of any kind)
please ask for guidance and clarification.

Office of Disability Services:


If you are a student with a disability and you need academic accommodations, please
notify me and contact the Office for Disability Services
[http://cte.gmu.edu/teaching/disability%20services ] (ODS) at 993-2474, http://ods.gmu.edu.
All academic accommodations must be arranged through the ODS.

Mason e-mail Accounts:


Students must use their MasonLIVE email account to receive important University
information, including messages related to this class. See http://masonlive.gmu.edu for
more information.

Other Useful Campus Resources:


Writing Center: A114 Robinson Hall; (703) 993-1200; http://writingcenter.gmu.edu
University Libraries “Ask a Librarian”: http://library.gmu.edu/mudge/IM/IMRef.html
Counseling And Psychological Services (CAPS): (703) 993-2380;
http://caps.gmu.edu
University Policies: The University Catalog, http://catalog.gmu.edu, is the central
resource for university policies affecting student, faculty, and staff conduct in university
academic affairs. Other policies are available at http://universitypolicy.gmu.edu/. All
members of the university community are responsible for knowing and following
established policies.

Version 2.2a Page 12 of 12 Spring 2018

You might also like