Topics covered in the Threat Hunting Course (TH-200)
- Threat Hunting Concepts and Practices
This module provides an overview of the basic objectives, concepts and practices of cyber threat hunting. It covers how enterprises implement threat hunting and the different stages and types of threat hunts.
- Threat Actor Landscape Overview
This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.
- Communication and Reporting for Threat Hunters
This module introduces the way in which threat hunters receive and use threat intelligence and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.
- Hunting with Network Data
This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in …