Course curriculum

    1. Segment: 00 Course Intro

    2. Segment: 01 Overview of Threat Hunting Concepts and Importance

    3. Segment: 02 How to Plan Threat Hunt

    4. Segment: 03 How to Document Threat Hunt

    1. Segment: 04 Hunting Methodologies

    2. Segment: 05 Telemetry and Data Sources

    3. Segment: 06 Essential Tools for Threat Hunting

    1. Segment: 07 Explore MITRE ATT_CK

    2. Segment: 08 How to Use MITRE Navigator_

    3. Segment: 09 From ATT_CK to Action Building a Hunt Matrix for Real Threats

    4. Segment: 10 Reading: MITRE Framework

    5. Reading: - MITRE Framework

    1. Segment: 13 Parsing and Cleaning Logs

    2. Segment: 14 Techniques for Log Parsing and Cleaning Part 1

    3. Segment: 15 Techniques for Log Parsing and Cleaning Part 2

    1. Segment: 16 Introduction to Feature Engineering_

    2. Segment: 17 Visualizing Behaviors

    3. Segment: 18 Threat Hunting Visualization_

    1. Segment: 19 What is Security-Focused Visualization

    2. Segment: 20 Create Your Own Visualization

    3. Segment: 21 Top Security Visualizations Every Threat Hunter Should Use

    4. Segment: 22 Reading: Effective Data Visualization

    5. Reading:- Effective Data Visualization

About this course

  • Free
  • 44 lessons
  • 4 hours of video content

Discover your potential, starting today