Applied Threat Hunting
Applied Threat Hunting
Intermediate
4 Hrs
Investigating, detecting, and defending your systems against modern threats.
Investigating, detecting, and defending your systems against modern threats.
Overview
Threat hunting is human-driven, iterative, and systematic. It effectively reduces damage and overall risk to an organization, as its proactive nature enables security professionals to respond to incidents rapidly. The combination of dynamic intelligence, analytics, and situational awareness tools, and perpetual data monitoring, brings about a reduction in false positives and wasted time throughout the Security Operations Center.
The course begins with the basics of threat hunting and data on threat hunting. Moving on, you will understand the adversary. Further, you will learn the mapping and working of an adversary with a data adversary. Next, you will work on creating research environments. After that, you will learn how to query the data. Next, you will explore hunting the adversary. Further, you will learn the importance of documenting and automating the process. As you move on, you will explore communicating and assessing data quality. Next, you will learn to understand the output and defining good metrics to track success in threat hunting. Then you will learn tools such as firewalls, antivirus, endpoint management, network packet capture, and security information and event management (SIEM). You will also need access to threat intelligence resources so you can look up IP addresses, malware hashes, indicators of compromise (IoCs), and more. Finally, you will learn to real-world use cases to identify attacker techniques
By the end of the course, you will have the skills and knowledge to hunt for threats with various techniques when responding to security incidents.
What You Will Learn
- Gain the foundation knowledge of the threat hunting practice.
- Learn about the frameworks and industry standards for hunting.
- Master how to extract, ingest, visualize, and analyze basic logs and events.
- Discover how to enrich your findings and add intelligence to them.
- Explore hunting the adversary.
Prerequisites
- Basic understanding of cybersecurity
- A computer system with at least the following: OS: Windows / macOS / Linux Processor: 1.8 GHz Memory: 8 GB Storage: 5 Gb Browser: Chrome / Firefox / Opera Containerization and virtualization software (Docker and VirtualBox or VMware)
Content
Chapter 1: Introduction to Threat Hunting
7 Videos
What Is Threat Hunting? Threat Hunter Mission What Do I Need to Be a Threat Hunter? Cyber Kill Chain Using MITRE ATT&CK Framework to map adversary TTP Exploits and Vulnerabilities $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: Hunting TTPs
5 Videos
Pyramid of Pain Signatures IOCs and IOAs Enrichment and Threat Intelligence Yara Rules Chapter 2 Quiz
Preview
Chapter 3: Hunting Logs and Events
3 Videos
Windows Events Linux logs Application logs Chapter 3 Quiz
Preview
Chapter 4: Hunting Network Traffic
2 Videos
Hunting Network Traffic Shipping Network Data Using Elastic Chapter 4 Quiz
Preview
Chapter 5: Hunting with a SIEM
5 Videos
Getting Started with Elastic Stack Deploying Elastic Stack with Docker Shipping Logs to the Elastic Stack How to Query the Data? Using Dashboards for Data Visualization Chapter 5 Quiz
Preview
Chapter 6: Hunting with Other Tools
1 Videos
Recommended Tools for Your Research Environment Chapter 6 Quiz
Preview
Chapter 7: Hunting Use Cases
5 Videos
Introduction Use case #1 - RDP Activities Use case #2 - AV Disabled Use case #3 - Credential Dump Use case #4 - Suspicious PowerShell Chapter 7 Quiz
Preview
Chapter 8: Course Conclusion
1 Videos
Recap Course Topics and Conclusion
Preview
This course is part of a learning path
769 enrollments
Course
Applied Threat Hunting
$59.99
skill path
Mastering Threat Intelligence
Learn threat detection analysis and detection the right way
Instructor
Marcos Vinicios Penha
Get access to only this course
$59.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise ยปReviews
(262 reviews)
5
Average Course Rating
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99