Threat Hunting - Defining the Process While Circumventing Corporate Obstacles
Offered By: YouTube
Course Description
Overview
Learn about effective threat hunting techniques and overcoming organizational challenges in this 47-minute conference talk from BSidesPhilly 2017. Explore the fundamentals of threat hunting, including activity tracking, success measurement, and hypothesis-driven methodology. Discover practical approaches to data collection through network hunting, PowerShell remoting, and Windows event forwarding. Delve into data analysis using ELQ and Hive, focusing on identifying normal patterns and anomalies. Gain insights on accountability, measurements, and addressing common obstacles in implementing a robust threat hunting process within corporate environments.
Syllabus
Introduction
Agenda
What is Threat Hunting
Activity Tracking
Measuring Success
Speak the Language
Select a Hypothesis
Hypothesis Driven Methodology
Data Collection
Network Hunting
PowerShell Remoting
Windows Event Forwarding
Summary
Data Analysis
ELQ
Data Enrichment
Hive
What is Normal
Data Analysis Analytics
Hive Observations
Accountability
Measurements
Questions
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network