I'm a Copywriter in a Digital Agency, I was searching for courses that'll help me broaden my skill set. Before signing up for Rob's.
Threat Hunting
Free
- Cyber Security, Programs
- 0 (Registered)
-
17
Jan
The Threat Hunting Professional Learning Path will help you establish a proactive defense mentality as well as proactively hunt for threats in an organization’s network, endpoints, or perimeter and be several steps ahead of forthcoming adversaries.
Course Outline:
MODULE 01 – INTRODUCTION TO THREAT HUNTING
- Introduction
- Incident Response
- Incident Response Process
- Incident Response & Hunting
- Risk Assessments
- Threat Hunting Teams
- Ad-hoc Hunter
- Analyst and Hunter
- Dedicated Hunting Team 2
MODULE 02 – THREAT HUNTING TERMINOLOGY
- Threat Hunting Terms
- Advanced Persistent Threat
- Tactics, Techniques & Procedures
- TTPs – IOCs
- Pyramid of Pain
- Hash Values
- IP Addresses
- Domain Names
- Network/Host Artifacts
- Tools
- TTPs
- Cyber Kill Chain Model
- The Diamond Mode
- Threat Hunting Mindset: Threat Intelligence
- The 3 Types of Threat Intelligence
- Strategic
- Tactical
- Operational
- Threat Hunting Mindset: Digital Forensics
- Attack Based Hunting
- Analytics Based Hunting
- Hunting Periods
- Point in Time
- Real Time
- Historic
- Reverse Engineering Binaries
- Threat Hunting Simulations 3
MODULE 03 – THREAT INTELLIGENCE
- Introduction
- Threat Intelligence Reports & Research
- Threat Intelligence Reports – FireEye
- Threat Intelligence Research
- Threat Sharing and Exchanges
- ISACs (Information Sharing and Analysis Centers)
- US-CERT (US Computer Emergency Readiness Team)
- Alien Vault OTX (Open Threat Exchange)
- VIDEO: OTX & IOCs
- Threat Connect
- MISP (Malware Information Sharing Platform)
- IOCs (Indicators of Compromise)
- OpenIOC
- IOC Editor
- VIDEO: Creating IOCs with IOC Editor
- Redline
- VIDEO: Redline and IOCs
- YARA
- VIDEO: YARA and YARA Rules
- HERA LAB: Hunting with IOCs
MODULE 04 – THREAT HUNTING HYPOTHESIS
- MITRE ATT&CK
- Data Collection and Analysis
- Data Governance
- Data Analysis
- Hunting Hypothesis and Methodology
- Pick a Tactic and Technique
- Identify Associated Procedure(s)
- Perform an Attack Simulation
- Identify Evidence to Collect
- Set Scope
- Hunting Metrics
Instructor
0.0
0 rating
5 stars
0%
4 stars
0%
3 stars
0%
2 stars
0%
1 star
0%
Related Courses
Free
“My first thought was, who am I to teach?”
– Mary Kate McDevitt, Skillshare teacher with 50,000 students
TRUSTED BY OVER 6000+ STUDENTS
Join our community of students around,the world helping you succeed.