YoVDO

Threat Hunting: Endpoint Hunting

Offered By: Pluralsight

Tags

Threat Hunting Courses Data Analysis Courses Cybersecurity Courses Endpoint Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Endpoint Hunting, you’ll learn to hunt for specific APT techniques found in endpoint data. First, you’ll explore the various endpoint data sets and how to take advantage of correlation. Next, you’ll discover how to find artifacts related to initial access, implants, and persistence. Finally, you’ll learn how to detect behaviors related to privilege escalation and credential stealing. When you’re finished with this course, you’ll have the skills and knowledge of endpoint hunting needed to provide the proactive approach to security analytics.

Syllabus

  • Course Overview 1min
  • Endpoint Data Sets 16mins
  • Access and Implants 17mins
  • Persistence 20mins
  • Privilege Escalation and Credential Stealing 12mins
  • Impossible Login 12mins

Taught by

Brandon DeVault

Related Courses

Windows 10 Security Features
Microsoft via edX
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Cybersecurity Compliance Framework & System Administration
IBM via Coursera
Cybersecurity Compliance and Framework
IBM via edX
Securing Microsoft Azure Data Access Endpoints
Pluralsight