Switch to the store?

Cyber Threat Hunting [Video]

More Information
Learn
  • Be vigilant and keep your systems secure before they’re infested
  • Proactively hunt for threats in your organization’s network 
  • Use threat intelligence to hunt for known threats
  • Analyze network traffic and identify malicious traffic with ease
  • Perform memory analysis using Redline and Volatility to identify malware attacks
About

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.

In this course, you will get to know about the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to minimize incidents. You'll perform incident response and hunt across hundreds of unique systems using PowerShell and identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residues.
You will determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms. You will be able to use memory analysis, incident response, and threat hunting tools to detect malware, attacker command lines, network connections, and more.

Style and Approach

With extensive theoretical exploration on the subject in the initial half of the course, the concepts are demonstrated effectively with the help of detailed practical sessions in the second half of the course.

Features
  • Advanced topics cover Threat Hunting right from threat analysis to threat mitigation. 
  • Use threat hunting tools to identify intrusive attacks and best measures to tackle threats.
  • Intensive coverage on various cyber-attacks on networks, websites, and endpoints.
Course Length 3 hours 7 minutes
ISBN 9781838557812
Date Of Publication 31 Jan 2019

Authors

Sunil Gupta

Sunil Gupta is an experienced computer programmer and cybersecurity expert. Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for, and a member of, many key organizations.

Sunil has helped many organizations around the Globe including Barclays Bank, Aviation College Qatar (QATAR), Ethiopian Airlines, Telecom Authority Tanzania, NCB Bank (Saudi Arabia), Accenture (India), Afghan Wireless (Afghanistan), and many more.

Currently, he teaches online over 50,000 students in more than 170 countries and some of his best work has been published by major publishing houses. Some of his best courses include: End-to-End Penetration Testing with Kali Linux and Threat and Vulnerability Assessment for Enterprises.

His cybersecurity certifications include SSCP Certification (Systems Security Certified Practitioner), Bug Bounty Program Certification, and more.

https://www.linkedin.com/in/sunilguptaethicalhacker/