Expert
Threat Hunting & Analysis Techniques
- 1 Section
- 10 Lessons
- 2 Quizzes
- 2h 30m Duration
Course
10 Lessons2 Quizzes
- Lesson 1: Introduction to Threat Hunting
- Lesson 2: Hypothesis-Driven Hunting
- Lesson 3: Leveraging the MITRE ATT&CK Framework
- Lesson 4: Data Sources for Threat Hunting
- Lesson 5: YARA Rules and Custom Signatures
- Q&A
- Lesson 6: Hunting with SIEM and EDR Platforms
- Lesson 7: Memory & Process Analysis
- Lesson 8: Threat Actor Profiling
- Lesson 9: Documenting and Sharing Hunt Findings
- Lesson 10: Building a Repeatable Hunt Program
- Q&A
Overview:Threat hunting helps detect threats that evade traditional security tools. This course guides you in forming threat hypotheses, performing data analysis, and utilizing threat intelligence to uncover hidden risks.You'll Learn:
How to proactively identify advanced threats
Techniques for log analysis and anomaly detection
Using indicators of compromise (IOCs) to track malicious activity
