Threat Hunting: Network Hunting
Offered By: Pluralsight
Course Description
Overview
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.
Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Network Hunting, you’ll learn to hunt for specific APT techniques found in network data. First, you’ll explore the data sets and importance of centralized network collection. Next, you’ll discover how to search for phishing and C2 artifacts. Finally, you’ll learn how to detect behaviors related to lateral movement and any objectives the adversary is attempting to accomplish. When you’re finished with this course, you’ll have the skills and knowledge of network hunting needed to provide the proactive approach to security analytics.
Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Network Hunting, you’ll learn to hunt for specific APT techniques found in network data. First, you’ll explore the data sets and importance of centralized network collection. Next, you’ll discover how to search for phishing and C2 artifacts. Finally, you’ll learn how to detect behaviors related to lateral movement and any objectives the adversary is attempting to accomplish. When you’re finished with this course, you’ll have the skills and knowledge of network hunting needed to provide the proactive approach to security analytics.
Syllabus
- Course Overview 1min
- Normalizing the Traffic 19mins
- Phishing 13mins
- Command and Control 28mins
- Lateral Movement 16mins
- Actions on Objective 10mins
Taught by
Brandon DeVault
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network