Curriculum
- 6 Sections
- 6 Lessons
- 50 Days
Expand all sectionsCollapse all sections
- Threat Hunting Concepts and Practices1
- Threat Actor Landscape Overview1
- Communication and Reporting for Threat Hunters1
- Hunting with Network Data1
- Hunting on Endpoints1
- Threat Hunting without IoCs1
This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.
Prev
This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in networks are covered, followed by hands-on exercises to develop threat detection skills.
Next

