Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cyber Threat Hunting

Description

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.

Tags

Syllabus

  • Introduction to Cyber Threat Hunting Techniques
    • Introduction to cyber threat hunting
  • Detect
    • Explore what is needed for an effective cyber threat hunting program
  • Investigate
    • Explore the concepts of anomalous activity and investigation
  • Remediate
    • Determine how to identify the malmare issue and remediate it
  • Attack Simulation
    • Explore attack simulators to test your monitoring and alerting solutions
  • Cyber Threat Hunting Review
    • Review the steps of cyber threat hunting to reinforce what you have learned so far
  • Cyber Threat Hunting Project
    • A cyber threat hunting project uses a traffic analysis exercise to test what you've learned

Online Course


Cyber Threat Hunting

Affiliate notice

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.

  • Introduction to Cyber Threat Hunting Techniques
    • Introduction to cyber threat hunting
  • Detect
    • Explore what is needed for an effective cyber threat hunting program
  • Investigate
    • Explore the concepts of anomalous activity and investigation
  • Remediate
    • Determine how to identify the malmare issue and remediate it
  • Attack Simulation
    • Explore attack simulators to test your monitoring and alerting solutions
  • Cyber Threat Hunting Review
    • Review the steps of cyber threat hunting to reinforce what you have learned so far
  • Cyber Threat Hunting Project
    • A cyber threat hunting project uses a traffic analysis exercise to test what you've learned