Hunt and Gather - Developing Effective Threat Hunting Techniques

Hunt and Gather - Developing Effective Threat Hunting Techniques

RSA Conference via YouTube Direct link

Intro

1 of 28

1 of 28

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hunt and Gather - Developing Effective Threat Hunting Techniques

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 What is Threat Hunting
  4. 4 What does it all require
  5. 5 Choosing a model
  6. 6 Application shimming
  7. 7 Attack Miter Framework
  8. 8 Prerequisites
  9. 9 Where do we begin
  10. 10 System perspective
  11. 11 Hunting signature
  12. 12 Account creation
  13. 13 Windows Admin Shares
  14. 14 Windows Event Logs
  15. 15 Executable Launch from Extracted Archive
  16. 16 Job Impression
  17. 17 Hunting Time
  18. 18 Hunting Lateral Movement
  19. 19 Hunting Network Connections
  20. 20 Hunting Web Shells
  21. 21 Advanced Threat Hunting
  22. 22 shim cache hunting
  23. 23 build a hunting dashboard
  24. 24 be proactive
  25. 25 create a dashboard
  26. 26 create custom signatures
  27. 27 download the free utilities
  28. 28 wrap up

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.