Go to Hunt, Then Sleep
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a soothing bedtime tale for threat hunters in this 46-minute Black Hat conference talk. Learn the first five essential hunts to find bad actors and help CISOs rest easy. Discover how to identify hunt targets, find tactics and techniques, map to an attack lifecycle model, and create a hunting plan. Delve into topics such as automation, data exfiltration, lateral movement, industrial control systems, data historians, and machine learning. Gain valuable insights to improve your organization's cybersecurity posture and sleep soundly knowing you're prepared to tackle potential threats.
Syllabus
Introduction
Introductions
A Song of Intel and Planning
Identify Your Hunt Targets
Find Your Tactics and Techniques
Map to an Attack Lifecycle Model
Match Tactics and Techniques
Hunting Plan
Automation
Data Exfiltration
Lateral Movement
Industrial Control System
Data Historian
Machine Learning
Conclusion
Taught by
Black Hat
Related Courses
Advanced Network SecurityLearnQuest via Coursera Advanced Threat Hunting and Incident Response
LearnQuest via Coursera AWS SimuLearn: Threat Hunting
Amazon Web Services via AWS Skill Builder Busca de ameaças com a implantação do AWS Network Firewall (Português) | Threat Hunting with AWS Network Firewall Deployment (Portuguese)
Amazon Web Services via AWS Skill Builder Penetration Testing, Threat Hunting, and Cryptography
IBM via Coursera