YoVDO

Hunt and Gather - Developing Effective Threat Hunting Techniques

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Threat Hunting Courses

Course Description

Overview

Explore effective threat hunting techniques in this 40-minute RSA Conference talk by Tim Bandos, CISO of Digital Guardian. Learn how to stay ahead of hackers through innovative strategies, including application shimming, attack MITRE framework, and Windows admin shares analysis. Discover prerequisites for successful threat hunting, gain insights into system perspectives, and understand how to hunt for lateral movement, network connections, and web shells. Delve into advanced techniques like shim cache hunting, building custom dashboards, and creating proactive signatures. Acquire practical tips to plan, develop, and execute your own threat hunting techniques, leveraging free utilities and best practices shared by an experienced threat hunting team.

Syllabus

Intro
Agenda
What is Threat Hunting
What does it all require
Choosing a model
Application shimming
Attack Miter Framework
Prerequisites
Where do we begin
System perspective
Hunting signature
Account creation
Windows Admin Shares
Windows Event Logs
Executable Launch from Extracted Archive
Job Impression
Hunting Time
Hunting Lateral Movement
Hunting Network Connections
Hunting Web Shells
Advanced Threat Hunting
shim cache hunting
build a hunting dashboard
be proactive
create a dashboard
create custom signatures
download the free utilities
wrap up


Taught by

RSA Conference

Related Courses

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Threat Hunting with Yara
Pluralsight
Enterprise Security: Policies, Practices, and Procedures
Pluralsight
Managing and Responding to Security Events Using Azure Sentinel
Pluralsight