MalwareMike wrote: » It sounds like you pretty much do everything security related...so out of your day-to-day duties, what area do you weak on?
sb97 wrote: » MalwareMike's question is a good place to start. From my experience: Sec503 If you want to strong background into Intrusion Analysis For500 If you want a strong forensics background For508 If you are looking for a solid foundation in Incident Response For578 If you are looking at Cyber Threat Intelligence There were a number of SOC managers/team leads in my For578 class looking to incorporate threat intel into their groups.
TechGuru80 wrote: » I think you should look at what kind of services you want to handle internally versus what you will end up outsourcing. Where is your organization weak? Are you solid on OS configurations by using tools like CIS benchmarks? A lot of the pen testing and forensics stuff I assume will get outsourced, and if you are the main security person you probably don't have much time for that anyways. I would probably focus on courses that will help you catching some of the basic intrusions...SEC505, SEC503 or FOR500 seem like good choices based on immediate usability and what appears to be a small team with limited resources. I probably would lean more towards either SEC505 or SEC503 first unless you are really solid on Windows and packet analysis because those lead well into performing forensics.
sb97 wrote: » I worked for two separate companies that sent new analysts to Sec503 during their first year. In both cases, new analysts started out as ticket monkeys working on IPS/DLP/etc events. It really is a good place to start because it covers how to read network activity and not just respond to individual events.
bsjj27 wrote: » I'm thinking I will go FOR508, been seeing a lot of good stuff on this course and I feel my incident response skills probably need the most work. I'm watching the demo now and they say FOR500 is not required but recommended. Do you think I really need it? I took GCIH and have a long history administering and securing Microsoft based products.
sb97 wrote: » I don't think you need it but it does help a little. For500 teaches you what the various Windows Artifacts are and where to find them. You can see the main artifacts in the bottom section (Evidence Of) in this poster:https://www.sans.org/security-resources/posters/windows-forensics-evidence-of/75/download You can use some other resources like the Digital Forensics Survival Guide Podcast to learn about those artifacts.Digital Forensic Survival Podcast – "Sharpen your computer forensic skills!" This poster would also be helpful for preparing:https://www.sans.org/security-resources/posters/hunt-evil/165/download
MalwareMike wrote: » Great list and input. FOR578 looks super interesting.