Infosec - Cyber Threat Hunting
- Offered byCoursera
Cyber Threat Hunting at Coursera Overview
Duration | 7 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Cyber Threat Hunting at Coursera Highlights
- Shareable Certificate
Quizzes and assessments
Flexible schedule
Cyber Threat Hunting at Coursera Course details
- Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make threat hunting more effective
- This learning path progresses through six courses, in which learner will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods
- Upon completion, learner will have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise
Cyber Threat Hunting at Coursera Curriculum
Introduction to Cyber Threat Hunting Techniques
Instructor introduction and course outline
What is cyber threat hunting?
Cyber threat hunting frameworks
Passion is required!
Networking technology knowledge: connectivity and IP addresses
Networking technology knowledge: the network stack and the OSI model
Networking technology knowledge: NAT/PAT
Networking technology knowledge: identifying IP sources and destinations
Operating systems/cloud computing/hosting
Security mitigation and monitoring tools
Programming and scripting skills
Vital scripts, programs, and commands
Understanding threat landscapes, layered security and posture
Introduction to Cyber Threat Hunting Quiz
Detect
Visibility tools
Logging sources
Traffic monitoring
Network and network device monitoring
Visibility tools examples
Using Linux and open-source tools
Network bandwidth/traffic monitoring tools
PRTG
Tcpdump
Tcpdump Top Talkers
ntop
IDS/IPS: Suricata and Snort
Online threat hunting tools
MITRE ATT&CK
Threat Crowd, Shodan
SEIM tools
Tailoring SIEM
Creating your dashboard
Setting up alerts
Source setup and logging
Setting up access
Setting up access part 2
Setting up alerts and filters
Testing your filters demo
Detect Quiz
Investigate
Identify anomalous activity
Identify, investigate and analyze demo
Investigate Anomalies Quiz
Remediate
Determine nature of attack, remediate, review and recommend
Tools for exploit prevention
Logging tools
Phishing email incidents
Host intrusion prevention systems (HIPS), system lockdown, and testing endpoint protection
Remediate Quiz
Attack Simulation
Sim tools defined
Attack simulation tools for Blue/Red teams
Malware demo
Attack Simulation Quiz
Cyber Threat Hunting Review
Detect, identify, and remediate recap
Other threat hunting duties
Final Quiz
Cyber Threat Hunting Project
Cyber threat hunting project walkthrough
Cyber threat hunting hints
Traffic analysis exercise
Cyberthreat hunting challenges
Cyber threat hunting challenge answers