Cyber Threat Hunting [Video]
This course has been retired. Check out the alternatives below
- $12.99 Video + Subscription Buy
-
What do you get with a Packt Subscription?
- Instant access to this title and 7,500+ eBooks & Videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Threat Hunting Introduction
- Course Overview
- Introduction to Threat Hunting
- Incident Response and Incident Handling
- Hunting Mindset - Threat Intelligence
- Hunter Mindset - Forensics
- Threat Hunting Simulation
- Threat Hunting Terminologies
-
Threat Hunting Methodology
- Threat Reports and Research
- Threat Sharing and Exchanges
- Indicators of Compromise
- Threat Hunting Methods
- Report Writing
-
Network Hunting
- Network Hunting Overview
- TCP/IP and Networking Primer
- Network Hunting Tools
- Network Hunting Summary
-
Suspicious Network Traffic Hunting
- ARP Analysis
- ICMP Analysis
- TCP Analysis
- DHCP Analysis
- DNS Analysis
- HTTP/HTTPS Analysis
- Unknown Traffic
-
Hunting Web Shells
- Web Shell Hunting Overview
- Web Shell Hunting Tools
- Hunting Web Shell – Part 1
- Hunting Web Shell – Part 2
-
Endpoint Hunting
- Endpoint Hunting Overview
- Windows Processes
- Endpoint Baselines
- Malware Classifications
- Malware Delivery
- Malware Evasion Techniques
- Malware Persistence
-
Hunting Malware
- Malware Hunting Overview
- Malware Detection Tools
- Malware Detection Techniques
- Memory Analysis
- Windows Event Logs
- Windows Event IDs