What You Need to Know Before
You Start
Starts 9 June 2025 21:37
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
49 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore threat hunting concepts, methodologies, and technologies to enhance cybersecurity defenses and proactively identify potential threats in your network.
Syllabus
- Introduction to Threat Hunting
- Threat Hunting Methodologies
- Understanding the Cyber Kill Chain
- Tools and Technologies for Threat Hunting
- Data Collection and Analysis
- Threat Intelligence and Data Sources
- Developing and Refining Threat Hunt Hypotheses
- Conducting a Threat Hunt
- Documentation and Reporting
- Case Studies and Practical Exercises
- Building a Threat Hunting Program
- Future Trends in Threat Hunting
Definition and Importance
The Role of a Threat Hunter in Cybersecurity
Hypothesis-Driven Approach
Intelligence-Driven Approach
Machine Learning and Automated Systems
Stages of the Cyber Kill Chain
Identifying Indicators of Compromise (IOCs)
Security Information and Event Management (SIEM) Systems
Endpoint Detection and Response (EDR) Tools
Network Traffic Analysis Tools
Threat Intelligence Platforms
Log and Network Traffic Analysis
Behavioral Analysis Techniques
Using Anomaly Detection
Open Source Intelligence (OSINT)
Threat Intelligence Feeds
Collaboration with External Cybersecurity Communities
Identifying Potential Attack Vectors
Crafting Hypotheses for Testing
Planning a Threat Hunt
Executing Search Queries
Analyzing and Validating Results
Effective Reporting Techniques
Communicating Findings to Stakeholders
Post-hunt Reviews and Feedback Loop
Real-World Threat Hunting Scenarios
Hands-on Labs and Simulations
Setting Objectives and Goals
Continuous Improvement and Training
Emerging Threat Technologies
Advances in AI and Automation in Threat Hunting
Subjects
Conference Talks