Abstract Tools for Effective Threat Hunting
Offered By: YouTube
Course Description
Overview
Explore effective threat hunting techniques in this 58-minute conference talk from BSides Nashville 2017. Delve into the Investigation Process, learn about observation strategies and data-driven observations, and discover the importance of curiosity and experience in cybersecurity. Master basic and realistic pivoting techniques, create investigative pivot charts, and explore common aggregations. Gain insights on building a knowledge base and understand the basic tenets of putting everything in place for successful threat hunting. Enhance your cybersecurity skills with practical tools and methodologies presented by Chris Sanders, emphasizing the importance of always questioning and developing expertise in the field.
Syllabus
Abstract Tools for
Rural Technology Fund
Hunting and Expertise
The Investigation Process
Always Be Questioning
Observation Strategy
Data Driven Observations
Curiosity and Experience
Basic Pivoting
Realistic Pivoting
Create an Investigative Pivot Chart
Explore Common Aggregations
Friendly Intel H&P
Creating a knowledgebase
Everything in Place - Basic Tenants
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network