The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.
The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.
The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.
The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 2
THREAT HUNTIING TRAINING OUTLINE
Module 1 - Day 1 : An Introduction to Cyber Threat Hunting
What is threat hunting? Breach Hypothesis Active Defense vs Proactive Defense Threat Hunting and its role in Enterprise Security Derivatives from Threat Hunting
Module 2 - Day 1 : Threat Hunting Process
Analysis, Data, Tools of Trade Building Hypothesis and relationship Mapping the Hypothesis to Incident Attack responses Key Takeaways
Module 3 - Day 2 : Methodologies of Threat Hunting
Preparing for the Hunt Data Gathering and Analysis Tools OSINT, Open Source tools and Enterprise Tools Artifacts, IOC's,IOA's, TTP's and Cyber Kill Chain Key Takeaways
Module 6 - Day 3 : Hunting for Threats
Hunting Networks based threats Hunting Host based threats Application based threats Endpoint/Server based threat hutning Utilizing various System and Security events Hunting using Logs -Splunk and other tools Key Takeaways
THREAT HUNTIING TRAINING | Training Outline
THREAT HUNTIING TRAINING OUTLINE
Module 7 - Day 3 : Advanced Threat Hunting Methodologies
OODA Threat hunting workflow designing Diamond Model MITRE and ATT&CK Key Takeaways