Threat Hunting

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

THREAT HUNTIING TRAINING OUTLINE

Module 1 - Day 1 : An Introduction to Cyber Threat Hunting


 What is threat hunting?
 Breach Hypothesis
 Active Defense vs Proactive Defense
 Threat Hunting and its role in Enterprise Security
 Derivatives from Threat Hunting

Module 2 - Day 1 : Threat Hunting Process


 Analysis, Data, Tools of Trade
 Building Hypothesis and relationship
 Mapping the Hypothesis to Incident
 Attack responses
 Key Takeaways

Module 3 - Day 2 : Methodologies of Threat Hunting


 Identifying the Crown Jewels
 Cyber threat patterns and signatures
 Threat intelligence & Threat Hunting
 Hypotheses: intelligence, awareness, analytics
 Key Takeaways

Module 4 - Day 2 : Analysis Techniques for Threat Hunting


 Data Stacking
 Visualization
 Grouping/Clustering
 Searching
 Key Takeaways

Module 5 - Day 2 : Beginning the Hunt


 Preparing for the Hunt
 Data Gathering and Analysis Tools
 OSINT, Open Source tools and Enterprise Tools
 Artifacts, IOC's,IOA's, TTP's and Cyber Kill Chain
 Key Takeaways

Module 6 - Day 3 : Hunting for Threats


 Hunting Networks based threats
 Hunting Host based threats
 Application based threats
 Endpoint/Server based threat hutning
 Utilizing various System and Security events
 Hunting using Logs -Splunk and other tools
 Key Takeaways

THREAT HUNTIING TRAINING | Training Outline


THREAT HUNTIING TRAINING OUTLINE

Module 7 - Day 3 : Advanced Threat Hunting Methodologies


 OODA
 Threat hunting workflow designing
 Diamond Model
 MITRE and ATT&CK
 Key Takeaways

THREAT HUNTIING TRAINING | Training Outline

You might also like