Go to Hunt, Then Sleep
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a soothing bedtime tale for threat hunters in this 46-minute Black Hat conference talk. Learn the first five essential hunts to find bad actors and help CISOs rest easy. Discover how to identify hunt targets, find tactics and techniques, map to an attack lifecycle model, and create a hunting plan. Delve into topics such as automation, data exfiltration, lateral movement, industrial control systems, data historians, and machine learning. Gain valuable insights to improve your organization's cybersecurity posture and sleep soundly knowing you're prepared to tackle potential threats.
Syllabus
Introduction
Introductions
A Song of Intel and Planning
Identify Your Hunt Targets
Find Your Tactics and Techniques
Map to an Attack Lifecycle Model
Match Tactics and Techniques
Hunting Plan
Automation
Data Exfiltration
Lateral Movement
Industrial Control System
Data Historian
Machine Learning
Conclusion
Taught by
Black Hat
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Natural Language Processing
Columbia University via Coursera Probabilistic Graphical Models 1: Representation
Stanford University via Coursera Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent