Abstract Tools for Effective Threat Hunting
Offered By: YouTube
Course Description
Overview
Explore effective threat hunting techniques in this 58-minute conference talk from BSides Nashville 2017. Delve into the Investigation Process, learn about observation strategies and data-driven observations, and discover the importance of curiosity and experience in cybersecurity. Master basic and realistic pivoting techniques, create investigative pivot charts, and explore common aggregations. Gain insights on building a knowledge base and understand the basic tenets of putting everything in place for successful threat hunting. Enhance your cybersecurity skills with practical tools and methodologies presented by Chris Sanders, emphasizing the importance of always questioning and developing expertise in the field.
Syllabus
Abstract Tools for
Rural Technology Fund
Hunting and Expertise
The Investigation Process
Always Be Questioning
Observation Strategy
Data Driven Observations
Curiosity and Experience
Basic Pivoting
Realistic Pivoting
Create an Investigative Pivot Chart
Explore Common Aggregations
Friendly Intel H&P
Creating a knowledgebase
Everything in Place - Basic Tenants
Related Courses
Social Network AnalysisUniversity of Michigan via Coursera Intro to Algorithms
Udacity Data Analysis
Johns Hopkins University via Coursera Computing for Data Analysis
Johns Hopkins University via Coursera Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX