www.cisa.gov Open in urlscan Pro
2a02:26f0:480:4a5::447a  Public Scan

URL: https://www.cisa.gov/resources-tools/programs/Incident-Response-Training
Submission: On December 01 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home
 2. Resources & Tools
 3. Programs

Share:




RESOURCES & TOOLS

 * All Resources & Tools
 * Services
 * Programs
 * Resources
 * Training
 * Groups


INCIDENT RESPONSE TRAINING

Related topics:
Cybersecurity Best Practices, Identity Theft and Personal Cyber Threats,
Multifactor Authentication


The best offense is a good defense. To help organizations across the nation
protect their IT enterprises and build their cyber talent, CISA offers Incident
Response (IR) training courses free to government employees and contractors
across federal, state, local, tribal and territorial government, educational and
critical infrastructure partners, and the general public. This training
addresses both an offensive and defensive view, providing not only the knowledge
and tools needed to prepare an effective response if a cyber incident occurs,
but also strategies to prevent incidents from happening in the first place.

The IR curriculum offers a range of trainings for beginner and intermediate
cyber professionals encompassing basic cybersecurity awareness and best
practices for organizations.

Sign up for trainings via the Upcoming Events sections below. To learn more
about how CISA may assist potentially impacted entities after a cyber incident,
visit the Cyber Incident Response page. 


INCIDENT RESPONSE TRAINING PRIVACY ACT STATEMENT

View Statement

Authority: 5 U.S.C. § 301 and 44 U.S.C. § 3101 authorize the collection of this
information.

Purpose: The purpose of this collection is to provide individuals access to
Cybersecurity and Infrastructure Security Agency (CISA) Incident Response
Training and information using CISA Webex.

Routine Uses: This information  may be disclosed as generally permitted under 5
U.S.C. § 552a(b) of the Privacy Act of 1974, as amended. This includes using the
information, as necessary and authorized by the routine uses published in
DHS/ALL-002 - Department of Homeland Security (DHS) Mailing and Other Lists
System November 25, 2008, 73 FR 71659.

Disclosure: Providing this information is voluntary; however, failure to provide
this information may prevent DHS from contacting you in the event there are
queries about your request or registration.


AWARENESS WEBINARS

Awareness webinars, also referred to as 100-level courses, are one-hour,
entry-level virtual and instructor-led classes with cybersecurity topic
overviews for a general audience, including managers and business leaders. These
trainings provide core guidance and best practices to prevent incidents and
prepare an effective response if an incident does occur. Previously recorded
webinars are available on the CISA YouTube Channel Protect Your Network:
Strengthen Your Cybersecurity with Our Incident Response Training(link is
external) and on the Federal Virtual Training Environment (FedVTE). These
webinars are intended for a non-technical audience and beginning incident
responders.

Training Topics:

Defending Internet Accessible Systems (IR104)

Internet-accessible systems have become the backbone of modern business and
communication infrastructure, from smartphones to web applications and the
explosive growth of the “Internet of Things” (IoT). Each of these systems and
devices, however, can be targeted by threat actors and used to conduct malicious
activity if they are unsecured. Worse, these systems can leave vulnerabilities
and sensitive information freely available for exploitation if they are not
properly configured and maintained.

This webinar includes the following information and more:

 * Common attacks and vulnerabilities: Understand common vulnerabilities of
   internet-accessible systems, how they are exploited by threat actors, and how
   to mitigate them to prevent attacks from succeeding.
 * CISA guidance: Learn key guidance, resources, and best practices to address
   vulnerabilities and prepare effective incident response and recovery.
 * Case studies: Examine the methods and impacts of real-life cyberattacks and
   learn how the targets responded and recovered.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.

Preventing Web and Email Server Attacks (IR105)

Web and email servers are the workhorses of the Internet — we couldn't run
government, businesses, or our personal lives without them! However, the
information exchanged through web and email servers can offer a tempting target
for cyber attackers.

This webinar includes the following information and more:

 * Common attack methods: Hackers can target and decode victims' web and email
   traffic, compromise email security to make phishing attempts more likely to
   succeed or can even use botnets to shut down access to websites and conduct
   large-scale campaigns of malicious activity.
 * Key guidance for organizations: CISA provides resources and best practices to
   help individuals and organizations secure their web and email infrastructure.
 * Case studies: Explore the methods and impacts of real-life cyberattacks, and
   how the victims responded and recovered.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.

Preventing DNS Infrastructure Tampering (IR106)

The Domain Name System, commonly known as DNS, is often referred to as the
“phone book” of the internet. Every time we access the internet to visit our
favorite websites, we depend on DNS infrastructure to securely route us to our
intended destinations. While this shared infrastructure is incredibly useful, it
also presents a rich attack surface. Threat actors have the ability to shut down
websites and online services, replace legitimate website content with threats or
extortion attempts, and even route traffic to a carbon copy of a legitimate
website to steal information entered by users.

This webinar includes the following information and more:

 * Common attacks and vulnerabilities: Learn how to identify a potential attack
   on DNS infrastructure.
 * CISA guidance: CISA provides information on best practices to reduce the
   likelihood and impact of a successful DNS attack.
 * Case studies: Examine the methods and impacts of real-life cyberattacks and
   learn how the targets responded and recovered.
 * Knowledge checks: The course provides knowledge checks throughout the
   presentation to reinforce key concepts and takeaways.

Introduction to Network Diagramming (IR107)

To protect the confidentiality, integrity, and availability of an agency’s
network and the data contained therein, cybersecurity professionals must be able
to identify their network enterprise accurately and completely. Network diagrams
are essential and serve to help visualize what is on the network, how the
overall network is structured, and how all the devices on the network are
connected. Every organization should build and maintain current and accurate
network diagrams to help manage their network architecture and ultimately
determine how to best mitigate potential or realized risks and vulnerabilities.

This webinar includes the following information and more:

 * Importance of Network Diagrams: Students will learn the importance of
   creating and maintaining network topology diagrams. Students will also
   understand the importance of identifying data flows and storage, identifying
   remote access points and external connections, and using network segmentation
   for security.
 * Key Guidance for Organizations: CISA provides guidance on what to include in
   network diagrams.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.

Understanding Indicators of Compromise (IR108)

Indicators of compromise (IOCs) are the digital and informational “clues” that
incident responders use to detect, diagnose, halt, and remediate malicious
activity in their networks. This webinar provides an overview of IOCs for
incident responders and those who work with them, introduces example scenarios
and how IOCs can be used to trace activity and piece together a timeline of the
threat, and discusses tools and frameworks to help incident responders use IOCs
to detect, analyze, respond to, and report cyber threat activity.

This webinar includes the following information and more:

 * Importance of IOCs: Defines IOCs and demonstrates why tracking,
   investigating, and reporting IOCs are crucial to enterprise cybersecurity.
   Students will understand how IOCs are used for threat hunting and incident
   response, study different types of indicators, and learn how to collect
   different categories of IOCs.
 * Frameworks: Students will learn about the Cyber Kill Chain® and MITRE ATT&CK®
   Framework and how they support the analysis of IOCs.
 * Knowledge checks: The course provides knowledge checks throughout the
   presentation to reinforce key concepts and takeaways.

Defend Against Ransomware Attacks (IR109)

Ransomware attacks hit a new target every 14 seconds—shutting down digital
operations, stealing information, and exploiting businesses, essential services,
and individuals alike. This one-hour webinar provides essential knowledge and
reviews real-life examples of these attacks to help you and your organization
mitigate and respond to the ever-evolving threat of ransomware.

This webinar includes the following information and more:

 * Common attack methods: Learn the definition of ransomware, a summary of its
   large-scale impacts, and how these attacks have developed over time. The
   webinar will discuss common signs of a ransomware attack and how to respond
   if an attack is suspected.
 * Key Guidance for Organizations: CISA provides guidance for how to mitigate
   the impact of ransomware attacks and recover in the event of an attack.
 * Case studies: Explore the methods and impacts of real-life cyberattacks and
   learn how the victims responded and recovered.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.

Introduction to Log Management (IR110)

Log files provide the data that are the bread and butter of incident response,
enabling network analysts and incident responders to investigate and diagnose
issues and suspicious activity from network perimeter to epicenter. CISA is
proud to present this one-hour webinar introducing the fundamentals of
investigating logs for incidents.

This webinar includes the following information and more:

 * Common attack methods: Understand log analysis and its importance as a
   crucial component of incident response and network security.
 * Key guidance for organizations: Introduce resources and tools that enable
   organizations and individuals to use log analysis to query for threat
   activity, including security information and event management (SIEM) and full
   packet capture (FPCAP) analysis, and using PowerShell and Active Directory to
   run scripts.
 * Case studies: Explore the methods and impacts of real-life cyberattacks and
   learn how the victims responded and recovered.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.

Using the CISA Incident Response Playbook at Your Organization (IR111)

Produced in accordance with Executive Order 14028, “Improving the Nation’s
Cybersecurity,” CISA released the Federal Government Cybersecurity Incident and
Vulnerability Response Playbooks that provide federal civilian agencies with a
standard set of procedures to respond to vulnerabilities and incidents impacting
Federal Civilian Executive Branch (FCEB) networks. This course introduces
students to the Incident Response Playbook that describes the process FCEB
agencies should follow for confirmed malicious cyber activity for which a major
incident has been declared or not yet been reasonably ruled out. While the
playbooks are intended for federal agencies, CISA encourages public and private
sector partners to review them to help inform their own incident response
practices.

This webinar includes the following information and more:

 * Key guidance for organizations: Introduce the CISA Incident Response (IR)
   Playbook with an overview of the IR phases, key resources, standardizing
   shared practices, and the Incident Response Checklist. Learn about roles,
   responsibilities, and the importance of communication during an incident
   response.
 * Lessons learned: This course also highlights lessons learned and common
   missteps when implementing an IR playbook.
 * Knowledge check: The course concludes with a brief knowledge check section to
   reinforce key concepts and takeaways.


UPCOMING AWARENESS WEBINAR EVENTS

Jan 11, 2024
Training | Virtual/Online


INTRODUCTION TO LOG MANAGEMENT (IR110)


CYBER RANGE TRAINING

Cyber Range Trainings, also referred to as 200-level courses, are four-hour,
interactive, virtual, and instructor-led classes with step-action labs in a
realistic technical environment. These offerings are available for government
employees and contractors across federal, state, local, tribal, and territorial
government, educational partners, and critical infrastructure partners.

Cyber Range Training courses provide guided step-action labs for cybersecurity
analysts to learn and practice investigation, remediation, and incident response
skills. Students participate in short lectures followed by lab activities to
identify incidents and harden systems in the cyber range environment. These are
ideal for beginner and intermediate cybersecurity analysts who wish to learn
technical incident response skills.

Training Topics:   

Defending Internet Accessible Systems (IR204)

Participants will be introduced to tactics and strategies that enable them to
protect their organizations from attacks against internet-accessible system(s)
(i.e., internet-accessible system attacks or IAS) through awareness of
individual and organizational points of vulnerability.

Experience these benefits and more:

 * Practice in a realistic environment: Define IAS vulnerabilities and their
   indicators.
 * Learn how to implement CISA guidance: Course exercises include implementation
   of the recommendations in BOD 19-02.
 * Identify and mitigate vulnerabilities in real time: Students will identify
   common methods of scanning for vulnerabilities, analyzing event logs, and
   modifying firewall rules.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers will moderate discussion and conduct a recovery
   debrief for the exercises. Participants are also encouraged to help one
   another and offer relevant input to address peers’ questions.

Preventing Web and Email Server Attacks (IR205)

Participants will be introduced to common web and email vulnerabilities, as well
as the technologies of encryption and authentication to enhance web and email
security. This course uses an active participation approach to facilitate
realistic technical training and interaction opportunities for learners.

Experience these benefits and more:

 * Practice in a realistic environment: Analyze network and host-based artifacts
   and implement remediation changes for the identified vulnerabilities.
 * Learn how to implement CISA guidance: Course exercises include implementation
   of the recommendations in BOD 18-01.
 * Identify and mitigate vulnerabilities in real time: Students identify common
   web and email vulnerabilities and mitigate them by reconfiguring the web
   server and Domain Name System (DNS) settings.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers moderate discussion and conduct a recovery debrief
   for the exercises. Participants are encouraged to help one another and
   address peer questions.

Preventing DNS Infrastructure Tampering (IR206)

DNS is one of the core foundations of the internet. However, it continues to be
one of the mechanisms attackers use to perform malicious activities across the
globe. In this course participants will learn about various concepts associated
with DNS, become familiar with DNS tools and mapping information, be introduced
to common DNS tampering techniques, and gain an understanding of DNS mitigation
strategies to enhance security.

Experience these benefits and more:

 * Practice in a realistic environment: Analyze network and host-based artifacts
   and implement remediation changes for the identified vulnerabilities.
 * Learn how to implement remediations: Course exercises include remediating
   vulnerabilities.
 * Identify and mitigate vulnerabilities in real time: Students identify DNS
   infrastructure tampering techniques and mitigate them.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers moderate discussion and conduct a recovery debrief
   for the exercises. Participants are encouraged to help one another and offer
   relevant input to address peers' questions.

Understanding Indicators of Compromise (IR208)

Cyberattacks have made headlines for years, and the pace of threat activity
faced by government and private sector organizations is accelerating. Indicators
of compromise (IOCs) are the digital and informational “clues” that incident
responders use to detect, diagnose, halt, and remediate malicious activity in
their networks. In this training, participants will be introduced to common IOCs
and common protocols used to find them in their own systems.

Experience these benefits and more:

 * Importance of IOCs: Define IOCs and why tracking, investigating, and
   reporting IOCs are crucial to enterprise cybersecurity. Students will
   understand how IOCs are used for threat hunting and incident response,
   different types of indicators, and how to collect different categories of
   IOCs.
 * Practice in a realistic environment: Learn about the MITRE ATT&CK® Framework
   and how it supports the analysis of IOCs, potential threat actors related to
   the activity, and their associated tactics, techniques, and procedures
   (TTPs). Perform lab activities to detect IOCs using the MITRE
   ATT&CKFramework.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers moderate discussion and conduct a recovery debrief
   for the exercises. Participants are encouraged to help one another and offer
   relevant input to address peers' questions.

Defend Against Ransomware Attacks (IR209)

Ransomware is the fastest growing malware threat targeting home, business, and
government networks. Anyone with a computer connected to the internet is a
target. Ransomware infection is one computer, one person, one click away from
penetrating a network’s defense. If just one computer becomes infected with
ransomware, infection could quickly spread all over the network, which is why
ransomware protection is critical. Ransomware incidents have become increasingly
prevalent and pose an enormous risk to you and your organization’s critical
infrastructure. In this training, participants will be introduced to common
applications and process that harden network defenses, as well as key concepts
used in the prevention of ransomware attacks.

Experience these benefits and more:

 * Common attack methods: Define ransomware and identify best practices and
   preventive measures to mitigate the impact of ransomware attacks.
 * Practice in a realistic environment: Learn how to apply specific tools to
   configure and back up Active Directory policies, reset Kerberos Ticket
   Granting Ticket (KRBTGT) account passwords, and create application
   allow-listing policies.
 * Identify and mitigate vulnerabilities in real time: Students identify
   malicious domains and mitigate them by establishing a sinkhole and by
   blocking the malicious domain.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers moderate discussions and conduct a recovery debrief
   for the exercises. Participants are encouraged to help one another and offer
   relevant input to address peers' questions.

Introduction to Log Management (IR210)

Log files provide the data that are the bread and butter of incident response,
enabling network analysts and incident responders to investigate and diagnose
issues and suspicious activity from network perimeter to epicenter. Participants
will be introduced to basic principles of log management and configuration.
Federal compliance regulations of log configuration and management, including
OMB Memorandum 21-31, will also be introduced.

Experience these benefits and more:

 * Common attack methods: Understand the importance of the configuration,
   management, and analysis of logs for incident response and identify key
   processes of log management.
 * Practice in a realistic environment: Investigate and analyze log data for
   suspicious activity. Detect and correlate possible IOCs or malicious activity
   with threat intel. Exercises include configuring a DNS server, network device
   firewall, an operating system and more for proper logging.
 * Expert facilitation and peer discussion: Throughout the course, expert
   cybersecurity engineers moderate discussions and conduct a recovery debrief
   for the exercises. Participants are encouraged to help one another and offer
   relevant input to address peers’ questions.


UPCOMING CYBER RANGE TRAINING EVENTS

Dec 07, 2023
Training | Virtual/Online


DEFEND AGAINST RANSOMWARE ATTACKS CYBER RANGE TRAINING (IR209)


ON-DEMAND TRAINING

On-demand trainings are self-paced and available 24/7. They are presented as two
types of offerings: Step-by-Step Action Courses and Online Training Recordings.

Step-by-Step Action Courses: These courses are a mix of the 100- and 200-level
trainings without the use of the Cyber Training Range. They consist of lectures,
short videos, and the use of an alternate artificial environment where
participants practice exercises to test their incident response (IR) skills.

Training Topics:

Ransomware Overview

These courses provide an overview on ransomware and six preventative controls to
avoid becoming its victim. Each training provides a closed environment where
participants can safely practice their new skills. The courses cover the
following topics:

 * How to Block Malicious IPs. This module presents an overview of the
   importance of blocking malicious IPs and demonstrates how to block them.
 * How to Sinkhole a Malicious Domain. This module presents an overview of the
   sinkholing process and demonstrates how to properly implement a DNS sinkhole.
 * How to Disable Server Message Block (SMB). This module presents an overview
   of Server Message Block, including the importance of disabling SMBv1, and
   presents how to properly disable SMBv1 on your network.
 * How to Create Application Allow-listing Policies. This module presents an
   overview of the importance of creating Windows Defender Application Control
   (WDAC) allow-listing policies with PowerShell and a demonstration on how to
   set up these policies.
 * How to Back Up and Restore Active Directories. This module presents a review
   of the importance of backing up and restoring your network’s Active Directory
   after a network compromise, as well as a review of how to properly backup and
   restore a network’s Active Directory.
 * How to Reset a Kerberos Ticket Granting Ticket (KRBTGT) Account Password.
   This module presents the importance of resetting your network’s KRBTGT
   account password and how to properly execute this type of reset.

Federal Virtual Training Environment (FedVTE)

 

Online Training Recordings

These self-paced training recordings are available on the CISA YouTube channel
and include topics such as a ransomware. These videos are free and available to
the general public. Recordings can also be found on the Federal Virtual Training
Environment (FedVTE), which is available to federal, state, local, tribal, and
territorial government employees, federal contractors, and U.S. military
veterans.


Don’t Let Cyber Criminals Steal Your Connections: Securing Internet-Accessible
Systems(link is external)
prevnext
slide 1 to 3 of 5


STRENGTHEN YOUR RESOLVE – UNDERSTANDING DNS ATTACKS (LINK IS EXTERNAL)


DON'T GET CAUGHT IN THE WEB - UNDERSTANDING WEB AND EMAIL SERVER SECURITY (LINK
IS EXTERNAL)


DON’T LET CYBER CRIMINALS CASH IN – PREVENTING BUSINESS EMAIL COMPROMISE (LINK
IS EXTERNAL)


DON’T LET CYBER CRIMINALS CASH IN – PREVENTING BUSINESS EMAIL COMPROMISE (LINK
IS EXTERNAL)


DON'T GET CAUGHT IN THE STORM – SECURING CLOUD INFRASTRUCTURE (LINK IS EXTERNAL)




CONTACT INFORMATION

To ask a question or provide other feedback on IR training, contact us
at CyberInsights@cisa.dhs.gov(link sends email)

CyberInsights@cisa.dhs.gov


FREQUENTLY ASKED QUESTIONS

What is “incident response” training? Where can I learn more about it?
 * Based on the definition provided in NIST Special Publication 800-61, Computer
   Security Incident Handling Guide, cybersecurity incident response is a
   complex capability encompassing detecting incidents, minimizing loss and
   destruction, mitigating the weaknesses that were exploited, and restoring IT
   services.
 * The NICE Cybersecurity Workforce Framework outlines work roles for incident
   response analysts and tasks, skills, knowledge, and abilities required to be
   competent in an incident response role. Specifically, incident response is
   classified as a specialty area under the “Protect and Defend” category;
   however, the core skills taught apply beyond the scope of incident response
   activity.
 * When cyber incidents occur, the Department of Homeland Security (DHS)
   provides assistance to potentially impacted entities, analyzes the potential
   impact across critical infrastructure, investigates those responsible in
   conjunction with law enforcement partners, and coordinates the national
   response to significant cyber incidents. The Department works in close
   coordination with other agencies with complementary cyber missions, as well
   as private sector and other non-federal owners and operators of critical
   infrastructure, to ensure greater unity of effort and a whole-of-nation
   response to cyber incidents. To learn more, visit the Cyber Incident
   Response page.

Which types of courses are relevant to me?
 * The Incident Response Training series is designed to provide incident
   response training and organizational guidance.
 * Webinar courses provide an entry-level topic overview for those who know
   little about incident response in general, or a specific cybersecurity
   subject. They are recommended for anyone who works in or adjacent to network
   security and incident response, or anyone interested in learning more about
   personal or professional cybersecurity, organizational best practices for
   incident response, or specific attack types such as ransomware or business
   email compromise. 
 * Cyber Range Training courses have lab exercises designed to teach the basics
   of network investigation and defense. They are accessible to new
   cybersecurity workers who may lack real-world skill practice, but some
   theoretical understanding of cybersecurity and incident response enhances the
   value of the instruction.

Who can register for the courses?
 * The Awareness Webinars are open to a general audience.
 * The Cyber Range Training courses are available for government employees and
   contractors across Federal, State, Local, Tribal, and Territorial government,
   educational partners, and critical infrastructure partners. Please use your
   corporate, government, military, or education email addresses when
   registering as personal email addresses will not be approved for class
   attendance.

How do I participate in a training event?
 * To participate, visit the upcoming event sections on the webpage above
   to sign up for open courses. Please note that courses may not open for
   registration until approximately four weeks before the training date.

How can I be notified of upcoming courses?
 * When a course does open, an invitation to register is distributed to
   interested stakeholders. If you would like to be included on future IR
   training announcements, please email CyberInsights@cisa.dhs.gov(link sends
   email) and indicate which course type you would like to be notified about. 

Can I stream courses online?
 * Previous Awareness Webinars are made available for public viewing on-demand
   through FedVTE. Stream webinars at your convenience and share them with your
   friends and colleagues!
 * Previously recorded webinars are also available on the CISA YouTube
   Channel Protect Your Network: Strengthen Your Cybersecurity with Our Incident
   Response Training Playlist(link is external).
 * Cyber Range Trainings are not available on-demand, as they require
   participation in a cyber range environment.

What course topics are available?
 * Below is a list of confirmed IR course topics to be offered in Fiscal Year
   2022. This list may be updated as we expand the IR curriculum:
   * Ransomware 
   * Indicators of compromise
   * Internet-accessible system vulnerabilities 
   * Web and email server attacks 
   * Domain Name System (DNS) infrastructure tampering 
   * Log management
   * Network diagramming

Can I earn continuing education credits for these trainings?
 * While acceptance may vary depending on your certification vendor, all IR
   courses can be used to earn CPE credits.
   * Webinar: 1 credit hour
   * Cyber Range Training: 4 credit hours

What about the previous types of courses CISA offered in the IR Training series?
 * In Fiscal Year 2021 CISA offered the following IR courses in addition to the
   ones described previously.
   * Course Types
     * Observe the Attack: 2 credit hours. The “Observe the Attack” series
       red/blue team demonstration events are ideal for those who supervise,
       manage, support, or facilitate incident or crisis response. If you are
       looking for a front-row seat to a real-time incident response scenario,
       these events are for you!
     * Cyber Range Challenge: 6 credit hours. Cyber Range Challenges are
       incident response scenarios designed for experienced practitioners.
       Students are asked to complete class profiles to summarize their skill
       and experience, and teams are balanced so that newer incident responders
       can learn from and work with more experienced professionals. These are
       critical thinking and problem-solving challenges as much as they are a
       test of investigation and network defense skills. 
   * Course topics that were discontinued after 2021:
     * Cloud-based server attacks 
     * Cloud leak
     * Business email compromise


CISA RESOURCES


CYBERSECURITY TRAINING & EXERCISES




CYBER HYGIENE SERVICES




CYBER INCIDENT RESPONSE




CISA CYBERSECURITY AWARENESS PROGRAM




FEDERAL GOVERNMENT CYBERSECURITY INCIDENT AND VULNERABILITY RESPONSE PLAYBOOKS




ALERTS




BULLETINS




TAGS

Audience
Federal Government, Individuals and Families, Industry, Small and Medium
Businesses, State, Local, Tribal, and Territorial Government
Topics
Cybersecurity Best Practices, Identity Theft and Personal Cyber Threats,
Multifactor Authentication, Organizations and Cyber Safety, Incident Detection,
Response, and Prevention, Malware, Phishing, and Ransomware
Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback