Litehaus
Litehaus
  • Home
  • Workshops
  • Courses
  • Sec-Plus
  • Testimonials
  • Contact
  • Feed
  • More
    • Home
    • Workshops
    • Courses
    • Sec-Plus
    • Testimonials
    • Contact
    • Feed
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Workshops
  • Courses
  • Sec-Plus
  • Testimonials
  • Contact
  • Feed

Account


  • My Account
  • Sign out


  • Sign In
  • My Account
Find out more

Workshops

Network Reconnaissance (4 Hours)

In this hands-on workshop, we will use multiple tools to identify services, including software package and version information running on unknown systems. Network services to be targeted will include those running on non-standard ports or behind firewalls. After exploring the use of network scanning tools, we will switch our attention to analyzing website data by extracting website contents and exploring its metadata. Attendees will be provided access to their own lab environment.

Overview of Workshop Objectives

  • Scanning networks and hosts using nmap and nbtscan tools.
  • Enumerating SNMP and RPC services.
  • Basics of using the Metasploit framework.
  • Explore the use and impacts of the iptables firewall.
  • Extracting and analyze website content using wget.
  • Overview of the FOCA tool.
  • Perform document metadata analysis.
  • Extract and analyze image file metadata.

Prerequisite Knowledge:

  • Basic networking concepts (TCP/IP, DNS, etc.) and familiarity with the Unix/Linux command line.
  • Basic knowledge of web technologies (e.g., HTML).
  • Some familiarity with  the Windows Command Prompt.


Digital Forensics (4 Hours)

Learners will be introduced to digital forensics techniques, such as analyzing memory and filesystems using industry-standard tools. Students will be provided access to their own environment to use during this hands-on workshop!

Overview of Workshop Objectives

  • Inspect the Windows Registry.
  • Use RegRipper to Extract Information from Registry Hives.
  • Forensic Analysis of the Recycle Bin.
  • Extract information from LNK File.
  • Explore information in JumpList Files.
  • Discover recently run programs.
  • Get times of recently run program.
  • Find accesses to file servers.
  • Discover basic Volatility configuration and execution.
  • Explore Volatility plugins to analyze a Windows memory image.
  • Analyze running processes and network connections from a memory image.
  • Examine Windows registry 

Prerequisite Knowledge:

  • Basic networking concepts and familiarity with the Windows operating system.
  • Basic knowledge of operating systems concepts, such as processes and network connections.
  • Some familiarity with the Linux/Unix command line.
  • Some familiarity with the Windows command prompt.


Security Operations I (4 Hours)

This hands-on, "Packet Analysis for Security Operations" workshop explores the advanced filtering and analysis capabilities of Wireshark and associated tools to examine common network protocols and then apply these concepts to deconstruct captures of live attacks. Wireshark's analysis and data extraction tools will be employed to gather evidence from the capture.

Overview of Workshop Objectives

  • Analyze DNS, DNSSec, Cisco Discovery Protocol (CDP), and NetBIOS protocols
  • Analyze DNS attack examples
  • Explore the dumpcap & tshark tools
  • Extract data from packet captures containing malicious data

Prerequisite Knowledge:

  • Familiarity with TCP/IP networking, 
  • Familiarity with protocol fundamentals
  • Basic knowledge of Wireshark 
  • Basic knowledge of the Linux command line.


Detection Engineering Foundations (1 day)

This one-day, hands-on workshop offers an introduction to detection engineering focused specifically on common credential attacks. Participants will explore Microsoft Windows credential attack methods and learn to build effective detection mechanisms to identify these threats. Attendees will explore the shortcomings of default configurations, re-configure the Windows operating system to support security monitoring requirements, and then develop custom detection rules to detect credential attacks

Overview of Workshop Objectives

  • Review windows credential attack methods.
  • Explore and Configure sysmon
  • Review host based intrusion detection
  • Review and Configure credential attack detection rules.
  • Explore common Windows credential attacks
  •  Utilize methods to perform credential attacks.
  • Review credential attack alerts generated by custom rules.

Prerequisite Knowledge:

  • Basic understanding of Windows operating systems
  • Fundamental cybersecurity knowledge
  • Prior experience with security tools
  • Basic scripting or programming knowledge


Securing Secure Shell I (Half Day)

This half-day, hands-on course will equip you with the essential knowledge and skills to fortify your Secure Shell (SSH) servers against unauthorized access and attacks. You will dive deep into secure SSH server configuration attributes, implementing best practices to harden your environment. Through practical exercises and real-world scenarios, you will gain hands-on experience in configuring key-based authentication, disabling unnecessary features, and implementing robust logging mechanisms.

Overview of Workshop Objectives

  • Review secure shell server configuration attributes.
  • Disable root logins.
  • Changing default ports.
  • Block accounts with blank passwords.
  • Limit access attempts.
  • Allow only approved ssh protocol versions.
  • Disable tcp port forwarding.
  • Configure key based authentication.
  • Configure an IP allow list.
  • Configure a users and group allow list.
  • Configure idle connection timeout.
  • Create a logon/warning banner.
  • Restrict permitted algorithms.
  • Configure ssh activity logging.

Prerequisite Knowledge:

  • Basic Linux/Unix command-line proficiency
  • Understanding of basic networking concepts
  • Basic understanding of SSH
  • Basic understanding of public-key cryptography
  • Prior experience with server administration


Reverse Engineering and Threat Hunting (1 day)

This one-day, intensive course explores the fascinating world of reverse engineering and threat hunting. Participants will acquire hands-on experience examining malware to understand its behavior and develop detection rules. Through hands-on practice using real-world examples, participants will perform static and dynamic malware analysis, develop rules to support threat detection activities, and explore assembly language fundamentals.

Overview of Workshop Objectives

  • Review static vs dynamic malware concepts
  • Review IOC concepts
  • Explore static malware analysis methods
  • Review YARA and create a basic malware rule
  • Explore dynamic malware analysis methods
  • Sandboxing and behavioral analysis
  • Review assembly language concepts
  • Review disassembly concepts

Prerequisite Knowledge:

  • Intermediate knowledge of operating systems, file systems, processes, and memory management.
  • Basic cybersecurity knowledge
  • Basic programming or scripting experience
  • Prior exposure to malware analysis tools
  • Foundational knowledge of network protocols and analysis


Hands-on with Bash and Bash scripts for new learners in cyber (1 day)

This one-day, interactive, hands-on course provides a practical introduction to Bash and its scripting capabilities. Participants will explore essential Bash commands for navigating the file system, managing processes, manipulating text, and how to write and execute Bash scripts to automate repetitive tasks. The course will utilize real-world use cases of Bash in cybersecurity, such as incident response, vulnerability scanning, and log analysis.

Overview of Workshop Objectives

  • What is Bash and why is it important for cybersecurity?
  • The Linux command line interface.
  • Why Bash is Critical in Cyber Defense/Offense
  • Basic Bash commands
  • Introduction to Bash scripting.
  • Script structure and syntax.
  • Piping and Redirection
  • Variables and user input.
  • Conditional statements 
  • Loops
  • Functions
  • Common use cases for Bash in cybersecurity

Prerequisite Knowledge:

  • Basic computer literacy: Comfortable using a computer and navigating files and folders
  • Familiarity with the Linux operating system: 
  • Basic understanding of Linux concepts and commands is beneficial but not strictly required.
  • A willingness to engage with the command line and experiment with Bash commands and scripts


Hands-on with PowerShell for new learners in cyber (1 day)

This one-day, interactive, hands-on course provides a practical introduction to PowerShell. Participants will master essential PowerShell commands for navigating the file system, managing processes, manipulating data, and writing and executing PowerShell scripts to automate tasks, which are valuable skills in cybersecurity operations. The course will explore real-world use cases of PowerShell in cybersecurity, such as incident response, vulnerability scanning, log analysis, and Active Directory.

Overview of Workshop Objectives

  • What is PowerShell and why is it important for cybersecurity?
  • The Windows PowerShell console.
  • Basic PowerShell commands
  • Understanding cmdlets, parameters, and pipelines.
  • Introduction to PowerShell scripting.
  • Script structure and syntax.
  • Variables and Basic Data Types.
  • Conditional statements
  • Loops
  • Functions
  • Common use cases for PowerShell in cybersecurity

Prerequisite Knowledge:

  •  Comfortable using a computer and navigating files and folders
  • A basic understanding of Windows concepts and commands is beneficial but not strictly required.
  • A willingness to engage with the command line and experiment with PowerShell commands and scripts.


Hands-on with Python for new learners in cyber (1 day)

This one-day, interactive, hands-on course provides a practical introduction to Python programming, tailored specifically for cybersecurity applications. Participants will explore essential Python syntax, data structures, and control flow, enabling them to write and execute Python scripts to automate tasks. The course explores real-world use cases of Python in cybersecurity, such as network interactions, basic cryptography, and packet manipulation using popular libraries.

Overview of Workshop Objectives

  • Why Python for Cybersecurity?  
  • Setting up the Python environment
  • Basic Python syntax: variables, data types, operators, input/output.
  • Control flow: conditional statements, and loops
  • Functions: defining and calling functions, arguments & return values
  • Data structures: lists, tuples, dictionaries, sets.
  • File handling: reading from and writing to files
  • Automating tasks with Python
  • Network interactions with Python
  • Basic cryptography concepts with Python
  • Introduction to Scapy library for packet manipulation

Prerequisite Knowledge:

  •  Comfortable using a computer and navigating files and folders
  • A willingness to engage with code and experiment with Python scripts.PowerShell commands and scripts.


Introduction to OT and ICS/SCADA (Half Day)

This workshop provides participants with a better understanding of the unique security challenges faced by Operational Technology (OT) and Industrial Control Systems (ICS/SCADA) environments. Attendees will learn about important security controls, best practices, and risk mitigation strategies to protect critical infrastructure from cyber threats. The workshop will explore common vulnerabilities and the interplay between OT and ICS/SCADA systems.

Overview of Workshop Objectives

  •  Overview of relationship between OT and ICS/SCADA
  • Review OT Network devices and technologies
  • Review ICS/SCADA systems
  • Hands-on: Explore industrial control emulation software

Prerequisite Knowledge:

  • Basic familiarity with fundamental networking terminology, such as IP addresses, TCP/IP, and network protocols.
  • A foundational understanding of common cybersecurity threats, vulnerabilities, and mitigation techniques is beneficial.
  • Basic knowledge of IT systems


Continuous Monitoring and Security Operations (2 Day)

This course explores the tools and techniques used in Security Operations Centers (SOCs). Participants will explore how a SOC uses different software, including platforms such as Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR).

Overview of Workshop Objectives

  • SOC design and implementation.
  • Threat intelligence and incident response.
  • Continuous monitoring vs standard monitoring.
  • Security information and event management (SIEM) solutions.
  • Intrusion Detection and Prevention Systems (IDS/IPS)   
  • Vulnerability Scanners
  • Endpoint Detection and Response (EDR)
  • Extended Detection and Response (XDR)
  • Cloud Security Posture Management (CSPM)
  • User and Entity Behavior Analytics (UEBA)
  • Security automation and orchestration (SOAR)
  • Security analytics and machine learning.

Prerequisite Knowledge:

  •  Basic understanding of networking and security concepts.
  • Familiarity with operating systems and common security vulnerabilities.
  • Some experience with security tools such as firewalls and intrusion detection systems is beneficial but not required.


Post-Quantum Cryptography for Cyber Practitioners (Half Day)

This half-day course provides a comprehensive overview of post-quantum cryptography (PQC), exploring the emerging threats posed by quantum computing and the proactive measures organizations should implement to safeguard sensitive data. Participants will gain a solid understanding of quantum computing fundamentals, their potential impact on current cryptographic systems, and the evolving landscape of PQC solutions.

Overview of Workshop Objectives

  •  Explain the basic principles of quantum computing and their implications for cybersecurity
  • Identify opportunities and use cases for quantum computing across various industries
  • Understand the current state, limitations, and future forecast of quantum computing
  • Recognize the potential impact of quantum computing on cybersecurity and existing cryptographic systems
  • Explore post-quantum cryptography and standardization efforts
  • Explore PQC architecture and compliance requirements for its deployment

Prerequisite Knowledge:

  • Basic understanding of cybersecurity principles and cryptographic concepts
  • Familiarity with current encryption algorithms and their applications

Find out more

Copyright © 2025 Litehaus - All Rights Reserved.

Powered by

  • Privacy Policy
  • Terms and Conditions

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close