IT-Defense 2025System Forensics, Incident Handling and Threat Hunting with Entra ID Management

System Forensics, Incident Handling and Threat Hunting with Entra ID Management

Instructor: Paula Januszkiewicz

Duration: 2 days -  February 10 - 11, 2025

This comprehensive masterclass equips participants with the essential skills to effectively find, collect and preserve data, analyze incidents and maximize their understanding of cybersecurity events. The course is designed to be highly interactive and hands-on, providing in-depth knowledge across several critical areas.

The training begins with an introduction to Windows internals, covering processes, threads and techniques for gathering and analyzing system data. Participants will learn about securing monitoring operations and threat hunting, focusing on identifying and mitigating malware and uncovering hidden network activities.

The program also explores handling malicious code incidents, including preparation, detection, containment and recovery strategies. Advanced topics such as static and behavioral malware analysis, memory dumping and analysis and disk storage acquisition are thoroughly covered.

Participants will gain critical skills in managing Entra ID, including multi-factor authentication, passwordless authentication, identity protection, and privileged identity management. This training emphasizes best practices for securing and administering Entra ID within an organization, integrating with on-premises Active Directory, and third-party applications.

This course also offers a well-rounded approach to forensics and incident handling, with a strong focus on practical skills and real-world applications. It is intended for cybersecurity professionals, IT administrators, incident responders, and anyone responsible for securing and managing IT infrastructure.


Module 1: Introduction to Windows Internals

  • Introduction to Windows Internals
  • Processes and Threads
  • PID and TID
  • Information Gathering from Running Operating System
  • Obtaining Volatile Data
  • A Deep Dive into Autoruns
  • Effective Permissions Auditing
  • PowerShell Get NTFS Permissions
  • Obtaining Permissions Information with Access Check
  • Unnecessary and Malicious Services
  • Detecting Unnecessary Services with PowerShell

Module 2: Securing Monitoring Operations & Threat Hunting

  • Types of Hunting
  • Defining Hunt Missions
  • Malware Hiding Techniques
  • Uncovering Internal Reconnaissance
  • Uncovering Lateral Movement
  • Uncovering Hidden Network Transmissions

Module 3: Handling Malicious Code Incidents

  • Count of Malware Samples
  • Virus, Worms, Trojans, and Spywares
  • Incident Handling Preparation
  • Incident Prevention
  • Detection of Malicious Code
  • Containment Strategy
  • Evidence Gathering and Handling Eradication and Recovery

Module 4: Static Malware Analysis

  • Static Malware Analysis Scenarios
  • Types and Goals of Malware Analysis
  • Cloud-Based Malware Analysis
  • Incident Prevention and Response Steps
  • Containment and Mitigation
  • Executable analysis
  • Static Analysis Tools

Module 5: Behavioral Malware Analysis and Threat Hunting

  • Malware Detonation
  • Sysinternals Suite
  • Network Communication Analysis
  • Monitoring System Events
  • Memory Dump Analysis
  • Simulation of a Real Environment

Module 6: Memory: Dumping and Analysis

  • Introduction to Memory Dumping and Analysis
  • Creating Memory Dump - Belkasoft RAM Capturer and DumpIt
  • Utilizing Volatility to Analyze Windows Memory Image
  • Analyzing Stuxnet Memory Dump with Volatility
  • Automatic Memory Analysis with Volatile

Module 7: Disk: Storage Acquisition and Analysis

  • Introduction to Storage Acquisition and Analysis
  • Drive Acquisition
  • Mounting Forensic Disk Images

Price: € 2.100

Date: February 10-11, 2025

The Westin Leipzig Hotel
Gerberstraße 15
04105 Leipzig
Tel.: +49 341 988-0