How to Supercharge your Digital Marketing with Desire Paths
How to Supercharge your Digital Marketing with Desire Paths
12 Steps to Create Videos

OffSec TH-200 (OSTH) Threat Hunter Online 90 days (QAOSTH90) [Video]

Categories
Integrated Solutions Offering

Topics covered in the Threat Hunting Course (TH-200)

  • Threat Hunting Concepts and Practices

This module provides an overview of the basic objectives, concepts and practices of cyber threat hunting. It covers how enterprises implement threat hunting and the different stages and types of threat hunts.

  • Threat Actor Landscape Overview

This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.

  • Communication and Reporting for Threat Hunters

This module introduces the way in which threat hunters receive and use threat intelligence and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.

  • Hunting with Network Data

This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in …

7 Invisible Obstacles to Digital Marketing Success
7 Invisible Obstacles to Digital Marketing Success
5 Steps to Creating Successful Ads