Completed
File hashes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Threat Intelligence vs Threat Hunting
- 3 Threat Hunting Incident Response
- 4 Traditional Incident Response Model
- 5 Detection
- 6 Analysis
- 7 OTX
- 8 What Should We Do
- 9 Stop the Bleeding Containment
- 10 Threat Hunting
- 11 Pyramid of Pain
- 12 File hashes
- 13 Full disclosure
- 14 What is Threat Hunting
- 15 Eradication
- 16 Host Isolation
- 17 Post Incident
- 18 Preparation
- 19 Conclusion