Incident Analysis: Execution
In this hands-on lab, you will learn how to analyze common execution mechanisms during an incident response engagement.

Course Content
Upon completing this lab, you should be able to:
- List and describe selected common methods of Execution associated with Windows environments.
- Develop and test hypotheses relevant to Execution-related observations.
- Describe how generic analytical methods can be applied to the examination of Execution-related activity.
- Examine and analyze example evidence of the Execution T1059.001 PowerShell and T1059.003 Windows Command Shell.
- Use process lineage analysis to recreate a process tree and identify other commands attributable to the same adversary.
- Decode PowerShell command parameters that have been Base64 encoded (T1027.001 Command Obfuscation).
- Document different Execution findings.













