Course Outline
1 - Course Outline
- Threat Hunting Theory
- Threat Hunting Concepts, Frameworks, and Threat Models
- Threat Hunting Process Fundamentals
- Threat Hunting Methodologies and Procedures
- Network-Based Threat Hunting
- Endpoint-Based Threat Hunting
- Endpoint-Based Threat Detection Development
- Threat Hunting with Cisco Tools
- Threat Hunting Investigation Summary: A Practical Approach
- Reporting the Aftermath of a Threat Hunt Investigation
Target Audience
Security Operations Center staff
Security Operations Center (SOC) Tier 2 Analysts
Threat Hunters
Cyber Threat Analysts
Threat Managers
Risk Managements