This course covers the fundamentals of threat hunting; how to build out a hunt program in your own environment; and how to identify, define, and execute a hunt mission. The course introduces essential concepts for network and endpoint hunting and then allows learners to apply techniques to hunt for anomalous patterns. Hands-on activities follow real-world use cases to identify attacker techniques. Learners will leave the course with concrete use cases that they can leverage to hunt in their own environment.
Course Outline:
1. Threat Hunting Overview
2. Memory Acquisition
3. Timeline Analysis
4. Memory Forensic
5. Process Analysis
| Tanggal | Durasi | Harga | Pendaftar / Terkonfirmasi |
|---|
Pendaftaran Training