Threat Hunting - Demystified
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the often misunderstood concept of threat hunting in this 31-minute conference talk from RSA Conference. Delve into the world of unknown unknowns as Managing Principal Ashish Thapar from Verizon demystifies threat hunting and its importance as an effective cyber-defense strategy. Learn about the threat landscape, detection gaps, and a five-phase threat hunting model. Discover how to find evil in the sea of noise and examine a sample use case for hunting command and control (C2) activities. Gain insights into the ten commandments for effective threat hunting, including how to gauge your organization's cyber maturity level. Equip yourself with the knowledge to keep adversaries at bay and strengthen your cybersecurity posture through proactive threat hunting techniques.
Syllabus
Intro
THANK YOU TO OUR COMMUNITY PARTNER
Threat Landscape
Finding Evil - In the Sea of Noise
The Detection Gap
Demystifying Threat Hunting
Threat Hunting Model - The Fabulous Five
Threat Hunting Model - Phase 1
Threat Hunting Model - Phase 4
Threat Hunting Model - Phase 5
Sample Use Case: Hunting for C2
Ten Commandments for Effective Threat Hunting 1. Gauge your cyber maturity level
Taught by
RSA Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network