YoVDO

Threat Hunting - Defining the Process While Circumventing Corporate Obstacles

Offered By: YouTube

Tags

Conference Talks Courses Data Analysis Courses Cybersecurity Courses Data Collection Courses Threat Hunting Courses

Course Description

Overview

Learn about effective threat hunting techniques and overcoming organizational challenges in this 47-minute conference talk from BSidesPhilly 2017. Explore the fundamentals of threat hunting, including activity tracking, success measurement, and hypothesis-driven methodology. Discover practical approaches to data collection through network hunting, PowerShell remoting, and Windows event forwarding. Delve into data analysis using ELQ and Hive, focusing on identifying normal patterns and anomalies. Gain insights on accountability, measurements, and addressing common obstacles in implementing a robust threat hunting process within corporate environments.

Syllabus

Introduction
Agenda
What is Threat Hunting
Activity Tracking
Measuring Success
Speak the Language
Select a Hypothesis
Hypothesis Driven Methodology
Data Collection
Network Hunting
PowerShell Remoting
Windows Event Forwarding
Summary
Data Analysis
ELQ
Data Enrichment
Hive
What is Normal
Data Analysis Analytics
Hive Observations
Accountability
Measurements
Questions


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network