THREAT HUNTING
AUDIENCE
Network security professionals and incident responders who will be using security and logging products to assist with their network and endpoint hunting responsibilities
PRE-REQUISITES
Candidates with experience in incident response.
LOCATION
-
Online
-
Face to face (bootcamp)
-
Hybrid
-
Train-the-Trainer
DESCRIPTION
Threat Hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
The course offers a targeted search approach, using networks and datasets to identify threats when the goal is to find opponents' tactics, techniques and procedures. This is an advanced security practice seen only in organizations that are at the peak of security efforts. It represents an effective weapon against advanced cyber threats. The course is designed for participants who see themselves as immersed in the cyber world of analyst professions, Blue Team, SOC
COURSE OBJECTIVES
After completing this course, you should be able to:
-
The approach of this course will prepare you to:
-
Define Cyber Threat Hunting and articulate its value to an organization
-
Create or enhance an existing hunting program
-
Leverage provided use cases for your Hunting Program
-
Build hunt missions for threat hunting in your organization
-
Leverage both endpoint and network data for successful hunting
-
Implement a hunting mission to hunt, find, and automate the hunting process
-
Define and implement auditing policy to store informative data
-
Use SIEM Solution database to make statistical reviews