filmov
tv
Cyber Threat Hunting course overview

Показать описание
Cyber Threat Hunting course overview By Security Hunt
Section I
1. Big Data in Cyber Security.
2. Limitations of current Security Operations Center
3. What is SOAR in Cyber Security
4. Use cases of SOAR
Section II
5. Introduction to ELK
6. Installation of Elasticsearch
7. Installation of Kibana
8. Installation of Logstash
9. Configuration of ELK stack
10. Ingestion of data with Logstash
11. Visualizing data in Kibana
Section III
12. Introduction to Cyber Threat Hunting
13. Types of Threat Hunting
14. Threat Hunting Cycle
15. Generating hypothesis for Threat Hunting
16. Threat Hunting Maturity Model
Section IV
17. Pyramid of Pain
18. Threat Intelligence Framework
19. MITRE ATT&CK Framework
20. Demo of MITRE Data Analytics
Section V
21. Cyber Threat Intelligence (CTI)
22. What is STIX/TAXII
23. Top 20 Open source Threat Intelligence Feeds
24. Threat Reports
Section VI
25. Threat Hunting with YARA
26. YARA Module and yarGen
27. Hunting Malicious Artifacts with YARA
Section VII
28. Network Threat Hunting
29. Strategy for Network Threat Hunting
30. Expectation vs Reality
31. Data Source and Intel Source
32. Network Hunting Traffic and Tools
33. Network Pcap Analyzer
Section VIII
34. Web Shell Threat Hunting
35. Detecting Web Shell
36. Web Shell with Mutillidae
Section IX
37. Endpoint Threat Hunting
38. Open Source Incident Response Automation Tools
39. Endpoint Threat Analytics
Section X
40. Malware Threat Hunting
41. Malware Detection Tools
42. Malware Persistence
43. Memory Analysis
Section XI
44. Threat Hunting Using ELK
45. Data enrichment
46. Threat Hunter Playbook
47. Machine Learning for Threat Hunting
Section I
1. Big Data in Cyber Security.
2. Limitations of current Security Operations Center
3. What is SOAR in Cyber Security
4. Use cases of SOAR
Section II
5. Introduction to ELK
6. Installation of Elasticsearch
7. Installation of Kibana
8. Installation of Logstash
9. Configuration of ELK stack
10. Ingestion of data with Logstash
11. Visualizing data in Kibana
Section III
12. Introduction to Cyber Threat Hunting
13. Types of Threat Hunting
14. Threat Hunting Cycle
15. Generating hypothesis for Threat Hunting
16. Threat Hunting Maturity Model
Section IV
17. Pyramid of Pain
18. Threat Intelligence Framework
19. MITRE ATT&CK Framework
20. Demo of MITRE Data Analytics
Section V
21. Cyber Threat Intelligence (CTI)
22. What is STIX/TAXII
23. Top 20 Open source Threat Intelligence Feeds
24. Threat Reports
Section VI
25. Threat Hunting with YARA
26. YARA Module and yarGen
27. Hunting Malicious Artifacts with YARA
Section VII
28. Network Threat Hunting
29. Strategy for Network Threat Hunting
30. Expectation vs Reality
31. Data Source and Intel Source
32. Network Hunting Traffic and Tools
33. Network Pcap Analyzer
Section VIII
34. Web Shell Threat Hunting
35. Detecting Web Shell
36. Web Shell with Mutillidae
Section IX
37. Endpoint Threat Hunting
38. Open Source Incident Response Automation Tools
39. Endpoint Threat Analytics
Section X
40. Malware Threat Hunting
41. Malware Detection Tools
42. Malware Persistence
43. Memory Analysis
Section XI
44. Threat Hunting Using ELK
45. Data enrichment
46. Threat Hunter Playbook
47. Machine Learning for Threat Hunting