Curriculum
- 6 Sections
- 6 Lessons
- 50 Days
Expand all sectionsCollapse all sections
- Threat Hunting Concepts and Practices1
- Threat Actor Landscape Overview1
- Communication and Reporting for Threat Hunters1
- Hunting with Network Data1
- Hunting on Endpoints1
- Threat Hunting without IoCs1
This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in networks are covered, followed by hands-on exercises to develop threat detection skills.
Prev
This module teaches threat hunting techniques that don’t rely on known IoCs. It covers custom threat hunting, focusing on behavioral analysis and data correlation to detect advanced threats. Tools like CrowdStrike Falcon are used to apply these methods in practical scenarios.
Next

