Generating Hypothesis for Threat Hunting

Generating Hypothesis for Threat Hunting

Cyber Threat Hunting course overview By Security Hunt

Section I
1. Big Data in Cyber Security.
2. Limitations of current Security Operations Center
3. What is SOAR in Cyber Security
4. Use cases of SOAR

Section II
5. Introduction to ELK
6. Installation of Elasticsearch
7. Installation of Kibana
8. Installation of Logstash
9. Configuration of ELK stack
10. Ingestion of data with Logstash
11. Visualizing data in Kibana

Section III
12. Introduction to Cyber Threat Hunting
13. Types of Threat Hunting
14. Threat Hunting Cycle
15. Generating hypothesis for Threat Hunting
16. Threat Hunting Maturity Model

Section IV
17. Pyramid of Pain
18. Threat Intelligence Framework
19. MITRE ATT&CK Framework
20. Demo of MITRE Data Analytics

Section V
21. Cyber Threat Intelligence (CTI)
22. What is STIX/TAXII
23. Top 20 Open source Threat Intelligence Feeds
24. Threat Reports

Section VI
25. Threat Hunting with YARA
26. YARA Module and yarGen
27. Hunting Malicious Artifacts with YARA

Section VII
28. Network Threat Hunting
29. Strategy for Network Threat Hunting
30. Expectation vs Reality
31. Data Source and Intel Source
32. Network Hunting Traffic and Tools
33. Network Pcap Analyzer

Section VIII
34. Web Shell Threat Hunting
35. Detecting Web Shell
36. Web Shell with Mutillidae

Section IX
37. Endpoint Threat Hunting
38. Open Source Incident Response Automation Tools
39. Endpoint Threat Analytics

Section X
40. Malware Threat Hunting
41. Malware Detection Tools
42. Malware Persistence
43. Memory Analysis

Section XI
44. Threat Hunting Using ELK
45. Data enrichment
46. Threat Hunter Playbook
47. Machine Learning for Threat Hunting

Leave a Comment

You must be logged in to post a comment.