0% found this document useful (0 votes)
317 views2 pages

Threat Hunting

The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.

Uploaded by

rajesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
317 views2 pages

Threat Hunting

The document outlines a 3-day training course on cyber threat hunting. The training covers topics such as the threat hunting process, methodologies for threat hunting, analysis techniques, preparing for hunts, hunting for threats across networks and hosts, and advanced threat hunting methodologies. The training aims to teach participants what threat hunting is, how to build hypotheses and map incidents, analyze threat data and patterns, utilize threat intelligence, and design threat hunting workflows.

Uploaded by

rajesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

THREAT HUNTIING TRAINING OUTLINE

Module 1 - Day 1 : An Introduction to Cyber Threat Hunting


 What is threat hunting?
 Breach Hypothesis
 Active Defense vs Proactive Defense
 Threat Hunting and its role in Enterprise Security
 Derivatives from Threat Hunting

Module 2 - Day 1 : Threat Hunting Process


 Analysis, Data, Tools of Trade
 Building Hypothesis and relationship
 Mapping the Hypothesis to Incident
 Attack responses
 Key Takeaways

Module 3 - Day 2 : Methodologies of Threat Hunting


 Identifying the Crown Jewels
 Cyber threat patterns and signatures
 Threat intelligence & Threat Hunting
 Hypotheses: intelligence, awareness, analytics
 Key Takeaways

Module 4 - Day 2 : Analysis Techniques for Threat Hunting


 Data Stacking
 Visualization
 Grouping/Clustering
 Searching
 Key Takeaways

Module 5 - Day 2 : Beginning the Hunt


 Preparing for the Hunt
 Data Gathering and Analysis Tools
 OSINT, Open Source tools and Enterprise Tools
 Artifacts, IOC's,IOA's, TTP's and Cyber Kill Chain
 Key Takeaways

Module 6 - Day 3 : Hunting for Threats


 Hunting Networks based threats
 Hunting Host based threats
 Application based threats
 Endpoint/Server based threat hutning
 Utilizing various System and Security events
 Hunting using Logs -Splunk and other tools
 Key Takeaways

THREAT HUNTIING TRAINING | Training Outline


THREAT HUNTIING TRAINING OUTLINE

Module 7 - Day 3 : Advanced Threat Hunting Methodologies


 OODA
 Threat hunting workflow designing
 Diamond Model
 MITRE and ATT&CK
 Key Takeaways

THREAT HUNTIING TRAINING | Training Outline

You might also like