Cyber Threat Hunting [Video]
Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.
In this course, you will get to know about the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to minimize incidents. You'll perform incident response and hunt across hundreds of unique systems using PowerShell and identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residues.
With extensive theoretical exploration on the subject in the initial half of the course, the concepts are demonstrated effectively with the help of detailed practical sessions in the second half of the course.
|Course Length||3 hours 7 minutes|
|Date Of Publication||31 Jan 2019|
|Web Shell Hunting Tools|
|Hunting Web Shell – Part 1|
|Hunting Web Shell – Part 2|