Threat Hunting - Demystified
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the often misunderstood concept of threat hunting in this 31-minute conference talk from RSA Conference. Delve into the world of unknown unknowns as Managing Principal Ashish Thapar from Verizon demystifies threat hunting and its importance as an effective cyber-defense strategy. Learn about the threat landscape, detection gaps, and a five-phase threat hunting model. Discover how to find evil in the sea of noise and examine a sample use case for hunting command and control (C2) activities. Gain insights into the ten commandments for effective threat hunting, including how to gauge your organization's cyber maturity level. Equip yourself with the knowledge to keep adversaries at bay and strengthen your cybersecurity posture through proactive threat hunting techniques.
Syllabus
Intro
THANK YOU TO OUR COMMUNITY PARTNER
Threat Landscape
Finding Evil - In the Sea of Noise
The Detection Gap
Demystifying Threat Hunting
Threat Hunting Model - The Fabulous Five
Threat Hunting Model - Phase 1
Threat Hunting Model - Phase 4
Threat Hunting Model - Phase 5
Sample Use Case: Hunting for C2
Ten Commandments for Effective Threat Hunting 1. Gauge your cyber maturity level
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube