Six Steps to Effective ICS Threat Hunting

Six Steps to Effective ICS Threat Hunting

Dragos: ICS Cybersecurity via YouTube Direct link

Threat Intel

4 of 21

4 of 21

Threat Intel

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Six Steps to Effective ICS Threat Hunting

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Two Types of Threat Hunting
  3. 3 Environment vs Threat Hunting
  4. 4 Threat Intel
  5. 5 Questions
  6. 6 Favorite Threat Intel Feed
  7. 7 Using Open Source Reporting
  8. 8 Dragos Intel Feed
  9. 9 Commercial Intel Feed
  10. 10 Technical Reports
  11. 11 Activity Groups
  12. 12 Baselines
  13. 13 Coverage
  14. 14 Start the Conversation
  15. 15 Tools Techniques Approach
  16. 16 Purpose
  17. 17 Threat Hunting Model Applied
  18. 18 Trend Hunting Model Applied
  19. 19 Trend Hunting Approach
  20. 20 Lightning Round Question
  21. 21 People Process and Technology

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.