Completed
Account creation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hunt and Gather - Developing Effective Threat Hunting Techniques
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 What is Threat Hunting
- 4 What does it all require
- 5 Choosing a model
- 6 Application shimming
- 7 Attack Miter Framework
- 8 Prerequisites
- 9 Where do we begin
- 10 System perspective
- 11 Hunting signature
- 12 Account creation
- 13 Windows Admin Shares
- 14 Windows Event Logs
- 15 Executable Launch from Extracted Archive
- 16 Job Impression
- 17 Hunting Time
- 18 Hunting Lateral Movement
- 19 Hunting Network Connections
- 20 Hunting Web Shells
- 21 Advanced Threat Hunting
- 22 shim cache hunting
- 23 build a hunting dashboard
- 24 be proactive
- 25 create a dashboard
- 26 create custom signatures
- 27 download the free utilities
- 28 wrap up