Coursera
Coursera Logo

Infosec - Cyber Threat Hunting 

  • Offered byCoursera

Cyber Threat Hunting
 at 
Coursera 
Overview

Duration

7 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cyber Threat Hunting
 at 
Coursera 
Highlights

  • Shareable Certificate
    Quizzes and assessments
    Flexible schedule
Details Icon

Cyber Threat Hunting
 at 
Coursera 
Course details

More about this course
  • Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make threat hunting more effective
  • This learning path progresses through six courses, in which learner will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods
  • Upon completion, learner will have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise

Cyber Threat Hunting
 at 
Coursera 
Curriculum

Introduction to Cyber Threat Hunting Techniques

Instructor introduction and course outline

What is cyber threat hunting?

Cyber threat hunting frameworks

Passion is required!

Networking technology knowledge: connectivity and IP addresses

Networking technology knowledge: the network stack and the OSI model

Networking technology knowledge: NAT/PAT

Networking technology knowledge: identifying IP sources and destinations

Operating systems/cloud computing/hosting

Security mitigation and monitoring tools

Programming and scripting skills

Vital scripts, programs, and commands

Understanding threat landscapes, layered security and posture

Introduction to Cyber Threat Hunting Quiz

Detect

Visibility tools

Logging sources

Traffic monitoring

Network and network device monitoring

Visibility tools examples

Using Linux and open-source tools

Network bandwidth/traffic monitoring tools

PRTG

Tcpdump

Tcpdump Top Talkers

ntop

IDS/IPS: Suricata and Snort

Online threat hunting tools

MITRE ATT&CK

Threat Crowd, Shodan

SEIM tools

Tailoring SIEM

Creating your dashboard

Setting up alerts

Source setup and logging

Setting up access

Setting up access part 2

Setting up alerts and filters

Testing your filters demo

Detect Quiz

Investigate

Identify anomalous activity

Identify, investigate and analyze demo

Investigate Anomalies Quiz

Remediate

Determine nature of attack, remediate, review and recommend

Tools for exploit prevention

Logging tools

Phishing email incidents

Host intrusion prevention systems (HIPS), system lockdown, and testing endpoint protection

Remediate Quiz

Attack Simulation

Sim tools defined

Attack simulation tools for Blue/Red teams

Malware demo

Attack Simulation Quiz

Cyber Threat Hunting Review

Detect, identify, and remediate recap

Other threat hunting duties

Final Quiz

Cyber Threat Hunting Project

Cyber threat hunting project walkthrough

Cyber threat hunting hints

Traffic analysis exercise

Cyberthreat hunting challenges

Cyber threat hunting challenge answers

Cyber Threat Hunting
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cyber Threat Hunting
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...