YoVDO

Threat Hunting: Hypothesize and Plan

Offered By: Pluralsight

Tags

Threat Hunting Courses Cybersecurity Courses Cyber Threat Intelligence Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Hypothesize and Plan, you’ll learn hypotheses about threat actor activity and artifacts, and plan a hunt for specific APT techniques. First, you will cover the different types and methodologies used in a threat hunt, and how to process cyber threat intelligence. Next, you’ll learn to hypothesize what artifacts, what data, and what techniques you could use to hunt for threat actor activity. Finally, you’ll create a comprehensive threat hunting plan that will be executed over the course of the series. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to implement proactive detections in your environment.

Syllabus

  • Course Overview 1min
  • Prepare 15mins
  • Hypothesize 15mins
  • Plan 12mins

Taught by

Aaron Rosenmund

Related Courses

Cyber Threat Intelligence
IBM via Coursera
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
The Future of Network Security and Defence
Coventry University via FutureLearn
Data Collection and Processing (CTIA Prep)
Pluralsight