YoVDO

Cyber Threat Hunting and DFIR - Understanding Malware Attack Steps

Offered By: INFOSEC TRAIN via YouTube

Tags

Cybersecurity Courses PowerShell Courses Malware Analysis Courses Threat Detection Courses Security Operations Courses Memory Forensics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Cyber Threat Hunting and Digital Forensics and Incident Response (DFIR) in this comprehensive 47-minute video. Delve into the steps involved in identifying and mitigating malware attacks, and understand the critical role of DFIR in cybersecurity. Learn about threat hunting techniques, including telemetry hunts and PowerShell analysis, as well as the importance of audit logging. Examine the malware attack path and various detection methods using event logs, rules, and ETW artifacts. Gain insights into digital forensics, memory forensics, and the skills required for effective threat hunting and defensive security. Whether you're a beginner or an experienced professional, acquire valuable knowledge to strengthen your organization's defense against cyber threats and advance your career in the cybersecurity field.

Syllabus

Introduction
Agenda
Introduction to Threat Hunting & DFIR
Threat Hunting
Telemetry Hunt
Power Shell
Audit Logging
Malware Attack Path
Detections
Introduction to DFIR
Digital Forensics
Memory Forensics
Skill Required in Threat Hunting
Skills Useful in Defensive Security
End


Taught by

INFOSEC TRAIN

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy