YoVDO

The Hunter Games - How to Find the Adversary with Event Query Language

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Incident Response Courses Threat Detection Courses Threat Hunting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore threat-based detection techniques and learn how to effectively identify adversaries using Event Query Language in this conference talk from Circle City Con 2019. Discover various approaches to finding unexpected threats, including remote access analysis, environment monitoring, persistence detection, process examination, and WMI investigation. Gain insights into analytics libraries, attack frameworks, and data normalization. Delve into future developments such as real-time streaming and connect with resources to enhance your cybersecurity skills in adversary hunting.

Syllabus

Intro
Agenda
Threat Based Detection
How to find the adversary
What about when someone does something you didnt anticipate
Approach 1 Ask
Approach 2 Remote Access
Approach 3 Environment
Approach 4 Persistence
Approach 6 Processes
Approach 7 Attempts
Approach 8 WMI Incoming
Approach 9 Host
Approach 10 Host
Approach 11 Analytics
Analytics Library
Attack Framework
Normalization
Whats next
Realtime streaming
Getting in touch
Resources
Data


Related Courses

Information Security Management in a Nutshell
SAP Learning
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Enterprise Security Fundamentals
Microsoft via edX
Planning a Security Incident Response
Microsoft via edX
Introduction to Cybersecurity
Udacity