YoVDO

The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Threat Intelligence Courses Incident Response Courses Threat Hunting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intersection of threat intelligence and incident response in this comprehensive conference talk from BSides Cleveland 2018. Delve into the differences between threat intelligence and threat hunting, and learn how these concepts integrate with traditional incident response models. Discover the Pyramid of Pain and its relevance to cybersecurity strategies. Gain insights into key processes such as detection, analysis, containment, and eradication. Understand the importance of tools like OTX and techniques like host isolation. Examine the concept of full disclosure and its implications. By the end of this talk, acquire a deeper understanding of modern cybersecurity practices and how to effectively implement threat hunting in your organization's security framework.

Syllabus

Introduction
Threat Intelligence vs Threat Hunting
Threat Hunting Incident Response
Traditional Incident Response Model
Detection
Analysis
OTX
What Should We Do
Stop the Bleeding Containment
Threat Hunting
Pyramid of Pain
File hashes
Full disclosure
What is Threat Hunting
Eradication
Host Isolation
Post Incident
Preparation
Conclusion


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube