Overview
This course teaches learners how to define the threat hunting process and overcome corporate obstacles. The course covers topics such as activity tracking, selecting hypotheses, data collection, data analysis, and measurements. The teaching method includes lectures and practical activities. This course is intended for individuals interested in cybersecurity, threat hunting, and improving their organization's security posture.
Syllabus
Introduction
Agenda
What is Threat Hunting
Activity Tracking
Measuring Success
Speak the Language
Select a Hypothesis
Hypothesis Driven Methodology
Data Collection
Network Hunting
PowerShell Remoting
Windows Event Forwarding
Summary
Data Analysis
ELQ
Data Enrichment
Hive
What is Normal
Data Analysis Analytics
Hive Observations
Accountability
Measurements
Questions