THREAT HUNTIING TRAINING OUTLINE
Module 1 - Day 1 : An Introduction to Cyber Threat Hunting
What is threat hunting?
Breach Hypothesis
Active Defense vs Proactive Defense
Threat Hunting and its role in Enterprise Security
Derivatives from Threat Hunting
Module 2 - Day 1 : Threat Hunting Process
Analysis, Data, Tools of Trade
Building Hypothesis and relationship
Mapping the Hypothesis to Incident
Attack responses
Key Takeaways
Module 3 - Day 2 : Methodologies of Threat Hunting
Identifying the Crown Jewels
Cyber threat patterns and signatures
Threat intelligence & Threat Hunting
Hypotheses: intelligence, awareness, analytics
Key Takeaways
Module 4 - Day 2 : Analysis Techniques for Threat Hunting
Data Stacking
Visualization
Grouping/Clustering
Searching
Key Takeaways
Module 5 - Day 2 : Beginning the Hunt
Preparing for the Hunt
Data Gathering and Analysis Tools
OSINT, Open Source tools and Enterprise Tools
Artifacts, IOC's,IOA's, TTP's and Cyber Kill Chain
Key Takeaways
Module 6 - Day 3 : Hunting for Threats
Hunting Networks based threats
Hunting Host based threats
Application based threats
Endpoint/Server based threat hutning
Utilizing various System and Security events
Hunting using Logs -Splunk and other tools
Key Takeaways
THREAT HUNTIING TRAINING | Training Outline
THREAT HUNTIING TRAINING OUTLINE
Module 7 - Day 3 : Advanced Threat Hunting Methodologies
OODA
Threat hunting workflow designing
Diamond Model
MITRE and ATT&CK
Key Takeaways
THREAT HUNTIING TRAINING | Training Outline