YoVDO

Go to Hunt, Then Sleep

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Machine Learning Courses Industrial Control Systems Courses Lateral Movement Courses Threat Hunting Courses Data Exfiltration Courses

Course Description

Overview

Explore a soothing bedtime tale for threat hunters in this 46-minute Black Hat conference talk. Learn the first five essential hunts to find bad actors and help CISOs rest easy. Discover how to identify hunt targets, find tactics and techniques, map to an attack lifecycle model, and create a hunting plan. Delve into topics such as automation, data exfiltration, lateral movement, industrial control systems, data historians, and machine learning. Gain valuable insights to improve your organization's cybersecurity posture and sleep soundly knowing you're prepared to tackle potential threats.

Syllabus

Introduction
Introductions
A Song of Intel and Planning
Identify Your Hunt Targets
Find Your Tactics and Techniques
Map to an Attack Lifecycle Model
Match Tactics and Techniques
Hunting Plan
Automation
Data Exfiltration
Lateral Movement
Industrial Control System
Data Historian
Machine Learning
Conclusion


Taught by

Black Hat

Related Courses

Introduction to Artificial Intelligence
Stanford University via Udacity
Natural Language Processing
Columbia University via Coursera
Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Vision: The Fundamentals
University of California, Berkeley via Coursera
Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent