The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us

The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us

via YouTube Direct link

File hashes

12 of 19

12 of 19

File hashes

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Threat Intelligence vs Threat Hunting
  3. 3 Threat Hunting Incident Response
  4. 4 Traditional Incident Response Model
  5. 5 Detection
  6. 6 Analysis
  7. 7 OTX
  8. 8 What Should We Do
  9. 9 Stop the Bleeding Containment
  10. 10 Threat Hunting
  11. 11 Pyramid of Pain
  12. 12 File hashes
  13. 13 Full disclosure
  14. 14 What is Threat Hunting
  15. 15 Eradication
  16. 16 Host Isolation
  17. 17 Post Incident
  18. 18 Preparation
  19. 19 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.