All language subtitles for Part 1 (English)

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:07,400 --> 00:00:10,699 So we're going to go through in day one or in book one. 2 00:00:10,900 --> 00:00:13,689 We're going to go through step by step what we call the 3 00:00:13,700 --> 00:00:15,999 pickerel framework that has learned recovery. 4 00:00:16,000 --> 00:00:17,999 We're going to go through all of those steps 5 00:00:18,300 --> 00:00:20,589 because when we're looking at it attack something like 6 00:00:20,600 --> 00:00:21,799 Metasploit or 7 00:00:22,100 --> 00:00:25,289 endpoint security Bypass or bypassing a firewall we have 8 00:00:25,300 --> 00:00:28,289 to put that in a frame work context of how do you prepare 9 00:00:28,300 --> 00:00:29,599 for that attack? 10 00:00:29,600 --> 00:00:31,399 How do you identify that attack? 11 00:00:31,500 --> 00:00:33,799 How do you contain that attack and so on 12 00:00:34,100 --> 00:00:37,589 so this day becomes so important because Allows you 13 00:00:37,600 --> 00:00:40,689 to start rationalizing the attack techniques and then 14 00:00:40,700 --> 00:00:43,689 developing your preparation steps the policies processes 15 00:00:43,700 --> 00:00:46,889 procedures training to get ready for that eventuality 16 00:00:46,900 --> 00:00:49,089 tack and then also going through the steps for 17 00:00:49,100 --> 00:00:52,999 identification and containment if we didn't have this day maybe 18 00:00:53,000 --> 00:00:55,689 nothing but a whole bunch of different tools that may or 19 00:00:55,700 --> 00:00:57,899 may not become outdated in a year or so. 20 00:00:58,200 --> 00:01:00,689 So talking about this as a foundational framework and 21 00:01:00,700 --> 00:01:01,999 then using the tools 22 00:01:02,500 --> 00:01:06,489 gives you the mental framework to develop defenses regardless 23 00:01:06,500 --> 00:01:06,899 of whatever. 24 00:01:07,100 --> 00:01:08,799 Attack is coming at your organization. 25 00:01:09,000 --> 00:01:10,689 So we're going to go through each one of these to these 26 00:01:10,700 --> 00:01:13,788 different sections preparation identification containment 27 00:01:13,800 --> 00:01:17,588 eradication recovery Lessons Learned and yes, there are a 28 00:01:17,600 --> 00:01:20,389 whole bunch of labs throughout this day will be covering 29 00:01:20,400 --> 00:01:23,689 Windows cheat sheet command line Kung Fu getting started 30 00:01:23,700 --> 00:01:25,299 at the command line on Windows 31 00:01:25,300 --> 00:01:28,489 is so in central essential because so many of the attacks 32 00:01:28,500 --> 00:01:29,599 Target our Windows systems. 33 00:01:29,800 --> 00:01:31,889 We're going to talk about enterprise-wide identification 34 00:01:31,900 --> 00:01:34,989 and Analysis, which is a lab that's very very near and dear 35 00:01:35,000 --> 00:01:36,099 to my heart specifically. 36 00:01:36,100 --> 00:01:36,999 I'll explain that in a bit. 37 00:01:40,100 --> 00:01:42,788 We'll talk about Espionage intellectual property attacks 38 00:01:42,800 --> 00:01:44,999 legal issues in computer security. 39 00:01:45,000 --> 00:01:48,489 And then finally we have an incident response tabletop lab 40 00:01:48,500 --> 00:01:51,489 that it really think ties together the entire day and 41 00:01:51,500 --> 00:01:55,088 the reason why this lab is so important to cap off this day 42 00:01:55,100 --> 00:01:58,288 because it gives you a framework to very quickly 43 00:01:58,300 --> 00:02:03,588 gamify tabletop exercises with your co-workers with your 44 00:02:03,600 --> 00:02:04,499 employees 45 00:02:04,500 --> 00:02:07,189 with your management at your organization to determine the 46 00:02:07,200 --> 00:02:09,899 overall Readiness at your organization for an 47 00:02:10,300 --> 00:02:11,699 Coming against your organization. 48 00:02:12,000 --> 00:02:13,499 So let's go ahead and let's get started. 49 00:02:13,500 --> 00:02:16,099 We're going to jump between the podium here 50 00:02:16,400 --> 00:02:18,799 and live sessions at an undisclosed location. 51 00:02:18,900 --> 00:02:21,889 So now let's jump over to one of those live sessions and 52 00:02:21,900 --> 00:02:25,189 I'll see you in just a little bit for our next section here 53 00:02:25,200 --> 00:02:26,399 at the podium. 54 00:02:26,500 --> 00:02:27,299 Thank you so much. 55 00:02:33,100 --> 00:02:36,799 Now as I mentioned today is all about those policies, right? 56 00:02:36,800 --> 00:02:38,889 We're going to go through that pickerel framework for 57 00:02:38,900 --> 00:02:40,789 Preparation identification containment eradication 58 00:02:40,800 --> 00:02:44,399 recovery Lessons Learned going to do all of that today. 59 00:02:45,200 --> 00:02:47,499 And for some people that's kind of tough, 60 00:02:47,800 --> 00:02:49,199 right they come to a class. 61 00:02:49,200 --> 00:02:51,689 It's called hacker techniques exploits and incident handling 62 00:02:51,700 --> 00:02:53,689 and they somehow expect they're going to hit the ground 63 00:02:53,700 --> 00:02:56,289 immediately and start talking about hacker tools and 64 00:02:56,300 --> 00:02:57,999 techniques to breaking into things 65 00:02:58,500 --> 00:03:00,889 and they're a little bit confused by all the policy 66 00:03:00,900 --> 00:03:02,799 process and procedure that we cover in. 67 00:03:02,900 --> 00:03:03,499 A what 68 00:03:04,200 --> 00:03:05,199 but this day 69 00:03:05,500 --> 00:03:09,799 without question is the most important day of sans 504. 70 00:03:10,500 --> 00:03:12,789 This is the day that will help you contextualize and prepare 71 00:03:12,800 --> 00:03:17,589 for a tax regardless of what those attacks actually are as 72 00:03:17,600 --> 00:03:19,689 long as we know the techniques and the capabilities of 73 00:03:19,700 --> 00:03:22,989 adversaries and we know what components we can work with we 74 00:03:23,000 --> 00:03:25,299 can defend and reacts to a wide variety 75 00:03:25,300 --> 00:03:26,099 of different times. 76 00:03:26,500 --> 00:03:29,189 And as I mentioned earlier this day establishes the framework 77 00:03:29,200 --> 00:03:32,799 for us going through and covering different. 78 00:03:32,900 --> 00:03:35,889 At Trends and the different phases that an attacker will 79 00:03:35,900 --> 00:03:39,789 go through to try to gain access to your network because 80 00:03:39,800 --> 00:03:43,489 this framework is applicable to every single phase in the 81 00:03:43,500 --> 00:03:46,599 entire attack methodology that is out there today. 82 00:03:49,800 --> 00:03:52,799 Also as part of this Court's we have virtual machines 83 00:03:53,200 --> 00:03:56,189 the virtual machines have every tool that you need for this 84 00:03:56,200 --> 00:03:58,399 class built into them 85 00:03:58,900 --> 00:04:02,099 also almost all of the labs except for day six 86 00:04:02,400 --> 00:04:05,989 are able to be ran locally on your system and I want to 87 00:04:06,000 --> 00:04:07,699 explain that a little bit. 88 00:04:08,100 --> 00:04:09,889 There's a lot of classes and they have a lot of really 89 00:04:09,900 --> 00:04:13,589 really cool things will bring in all kinds of gear the front 90 00:04:13,600 --> 00:04:15,399 of the classroom for you to break into 91 00:04:16,100 --> 00:04:17,299 and that's great. 92 00:04:18,000 --> 00:04:19,898 The only problem I have with that. 93 00:04:19,899 --> 00:04:23,099 It's for a foundational class like 504. 94 00:04:23,700 --> 00:04:24,899 You can't take it home with you. 95 00:04:26,000 --> 00:04:28,799 I wanted to have every single lab in this course 96 00:04:29,100 --> 00:04:31,799 be able to run on a single machine. 97 00:04:32,100 --> 00:04:33,589 So you could continue practicing the different 98 00:04:33,600 --> 00:04:36,689 techniques that we cover in this course moving forward 99 00:04:36,700 --> 00:04:39,099 into the future without needing to have a lab 100 00:04:39,500 --> 00:04:42,799 now the Bible for VMS are 7-Zip compressed. 101 00:04:43,400 --> 00:04:44,999 We have seven zipper windows 102 00:04:45,300 --> 00:04:46,799 on the course USB. 103 00:04:47,000 --> 00:04:50,089 If you're using a Mac, you have to go to the App Store and 104 00:04:50,100 --> 00:04:51,699 download a 7 zip utility. 105 00:04:51,700 --> 00:04:54,289 There's a bunch of them out there pick one install it and 106 00:04:54,300 --> 00:04:54,999 run it I used to. 107 00:04:55,200 --> 00:04:56,399 Hand out caki 108 00:04:56,800 --> 00:05:00,389 the keka would work for one specific version of OS X and 109 00:05:00,400 --> 00:05:02,199 it wouldn't work on anything else. 110 00:05:02,300 --> 00:05:03,989 So it's better just to get it from the app store because it 111 00:05:04,000 --> 00:05:06,989 gets you the right version of the tool that you need to 112 00:05:07,000 --> 00:05:09,699 extract the virtual machines in this course. 113 00:05:10,300 --> 00:05:12,589 Now whenever you open up the virtual machine, it's going to 114 00:05:12,600 --> 00:05:16,199 say if you moved or copied, please select copy 115 00:05:16,500 --> 00:05:19,799 that causes the virtual machine to generate a new Mac address. 116 00:05:20,000 --> 00:05:21,799 So we don't have mac address collisions. 117 00:05:22,100 --> 00:05:24,999 So we want to extract that now because it's going to take some 118 00:05:25,300 --> 00:05:28,089 I'm the passwords in the user IDs for the virtual machines 119 00:05:28,100 --> 00:05:33,699 are SEC 504 for the user ID and the password is SEC 504 120 00:05:34,000 --> 00:05:36,789 and then for becoming root on the Linux machine it's to do 121 00:05:36,800 --> 00:05:38,499 su space - 122 00:05:38,800 --> 00:05:43,089 that - is incredibly important to make sure loads properly 123 00:05:43,100 --> 00:05:46,789 and I wouldn't worry about this too much because in a lot 124 00:05:46,800 --> 00:05:48,899 of our Labs we give you these exact commands. 125 00:05:48,900 --> 00:05:50,099 You don't have to memorize them. 126 00:05:50,300 --> 00:05:52,389 The only thing that you really need to memorize the user ID 127 00:05:52,400 --> 00:05:54,589 and the password for logging in which is pretty 128 00:05:54,600 --> 00:05:54,999 straightforward. 129 00:05:55,100 --> 00:05:58,099 Forward it just so happens to be the class version as well. 130 00:05:58,400 --> 00:05:59,199 If you're 131 00:05:59,600 --> 00:06:00,199 from 132 00:06:00,500 --> 00:06:03,189 another country and you have a different keyboard layout you 133 00:06:03,200 --> 00:06:05,489 can go into the virtual machines and change your 134 00:06:05,500 --> 00:06:08,799 keyboard layout from within the virtual machine as well. 135 00:06:12,200 --> 00:06:13,989 All right, as I mentioned earlier in one of the earlier 136 00:06:14,000 --> 00:06:17,299 videos a key component to being successful in Sands. 137 00:06:17,300 --> 00:06:20,789 504 On Demand is actually doing the labs in order to do the 138 00:06:20,800 --> 00:06:21,399 labs. 139 00:06:21,400 --> 00:06:23,489 You've got to get the virtual machines extracted and we've 140 00:06:23,500 --> 00:06:24,799 already talked about that 141 00:06:25,100 --> 00:06:28,789 but the other key part is the awesome day six or books X 142 00:06:28,800 --> 00:06:30,899 Capture the Flag event. 143 00:06:31,600 --> 00:06:34,789 It's common for many students that are just getting started 144 00:06:34,800 --> 00:06:38,889 with on-demand kind of put this part off until later you 145 00:06:38,900 --> 00:06:40,099 need to do this right now 146 00:06:40,500 --> 00:06:41,699 the capture the flag. 147 00:06:41,900 --> 00:06:45,289 On Demand is special and the reason why it's special is you 148 00:06:45,300 --> 00:06:48,389 get access to the on-demand VPN with a full capture-the-flag 149 00:06:48,400 --> 00:06:49,799 experience 150 00:06:50,100 --> 00:06:50,899 for months. 151 00:06:51,300 --> 00:06:52,799 Whereas in a live setting 152 00:06:53,400 --> 00:06:55,599 and set up for one day and that's it. 153 00:06:55,600 --> 00:06:58,489 You need to get set up you need to get configured and on this 154 00:06:58,500 --> 00:07:00,199 slide slide number eight. 155 00:07:00,200 --> 00:07:02,489 We have step-by-step instructions on how you're 156 00:07:02,500 --> 00:07:05,389 supposed to do that more importantly you're going to 157 00:07:05,400 --> 00:07:08,399 receive an email from Sands. 158 00:07:08,700 --> 00:07:10,289 And in that email it's going to give you step-by-step 159 00:07:10,300 --> 00:07:13,189 instructions and And links to download specific 160 00:07:13,200 --> 00:07:19,099 configuration files to do the capture the flag for Sands 504. 161 00:07:19,300 --> 00:07:21,389 So when you get that email don't just ignore it or send 162 00:07:21,400 --> 00:07:24,289 it to spam or send it to trash you want to pull that email up 163 00:07:24,300 --> 00:07:26,399 you want to go through those Instructions? 164 00:07:26,400 --> 00:07:30,789 Make sure the virtual machines can connect into the Sands VPN 165 00:07:30,800 --> 00:07:32,889 so that you can enjoy the full Capture the Flag experience 166 00:07:32,900 --> 00:07:35,489 when you do the capture the flag and I'll talk about this 167 00:07:35,500 --> 00:07:36,599 more in book six. 168 00:07:36,900 --> 00:07:37,899 Don't just do it. 169 00:07:37,900 --> 00:07:41,089 Once you want to be able to go through that CTF almost as 170 00:07:41,100 --> 00:07:43,589 though so it's cold like you can just do it without 171 00:07:43,600 --> 00:07:47,089 thinking and you'll get that opportunity because you're 172 00:07:47,100 --> 00:07:49,699 doing this on demand and you get access for this VPN 173 00:07:50,000 --> 00:07:52,499 for months after you get started in this class. 13785

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.