Overview
This is the list that I would always check when I got to a new system/network. I know that this list can't give you a well-rounded look at the system but it will make you think and gain knowledge of the system that you are working with -> and plan the improvement or find something that is not right in the system
Reading the system audit checklist and book is good you should read it, the guide is my own thought before I know about system audits.
1. Internet-facing servers/services
This is the first thing hacker can get their hand on, it is public to the internet so it is crucial that you understand and know these things (How many are there in your system)
Server's operating system (How many Linux, Windows, Mac, and its versions?)
Number Web application services (What are the technologies that are being used to build those websites?)
Number of Web servers (IIS, Apache, Nginx)
Domain (how many subdomains?)
5-tuples (Src, Dest IP Address, Src, Dest Port, Protocol)
Are there any remote access services that are public to the internet (RDP, VNC, VPN, SSH)
2. Understand Windows and Linux
Set up a lab and start poking around, you can create a lab as below, don't mind the AWS part just use VMware or VirtualBox or Docker Container to do it, and you will learn a lot.
3. Email
Most of the attacks come from BES (Business Email Compromise).
Small companies don't have the luxury of buying email services, they will self-hosted and will not have a protection system so there will be no filter or any security measure against the top vector of attack which is Email Phishing -> You need to look for Email system and its data flow.
Understand Email Header and how to investigate a phishing ticket
4. Logging
That is the data that you are collecting for your SIEM (If you don't have one, build one) -> ELK is a great start, and start ingesting logs to that instance and play around with it, such as what if you use PowerShell what logs does it generate? what is event ID, and what are the best practices to use that log -> any detection that could use this log source
Ref:
It is essential, logging is an act of mercy for you and your company, if you do not collect enough logs you will lose your visibility on your system. If your SIEM can handle the sheer amount of logs that pour in then good -> You will learn a lot by analyzing those data
A better understanding of the log source or the data source will better your detection and your DFIR process later on. I mean you should know what the data source provides you information as IP Address, process execution time when it first appears on the system, does the process communicates to the Internet, and so on.
Don't be scare, you will have time and mentor to guide you, and if not then it is ok, you still have a lot of time to familiar yourself with all of this 😘.
You must learn about the log format
Product Logs -> which is the log that is generated specifically for your company's product or vendor's product
How much log is enough?
You need to understand which log has high value and what are their use case, for example why you collect Event ID 4688 (search the internet and come back to these blogs and tell me why)
After you understand those concepts, now you need to understand how much data is enough
The number of logs you want to ingest is based on
5. Build your own dashboard
So you don't know how to do data analysis, but you have an account on SIEM and you can create your own shit then "Hell Yah" -> Create your own shit
So why build your own dashboard and why can I use the default or someone else dashboard, oh you could use the default and be done with it but that's not why you're here, you want to be better, you hunt for hackers not the other way around -> BUILD YOU OWN DASHBOARD (For a small scope first -> build dashboard for a VLAN first)
The benefit of that is
You know what you are looking at, the data source, you know what you are monitoring
You can quickly learn how the data in that VLAN or System
You can statistically create a baseline (What computer is talking to, how often it does that, and many more questions that you could come up with your own)
6. Familiar with the ticketing system
Most of the time if you are a young analyst you will have to do ticketing (case management) I don't like this but this is something you must do, although it is the simplest form of security task it is also one of the most important ones)
Here is a chart for you to understand
Dashboard Design
Just don't use the pie chart
Data Statistic
I mean you need to know these, understanding how to do basic statistics will help you a lot
7. Get to know the people
Okay, It is true that you need to have a list of systems and who is the owner of it, and learn by asking what is normal to them.
Join a community and follow people on Twitter, here are some channels, and people you need to follow
SANS (all of the accounts that belong to SANS Institute)
Many More will be added
Telegram
Discord
Many more will be added
8. Learning Structured Analytic
Conclusion
You don't have to learn all these things at once, pick one of them and start digging around for information using keywords that you find in other blogs, threads, or even this blog.
Don't be afraid to ask others for help.
Always asking why, no matter how dumb it is at the first time.