Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cyber Threat Hunting and DFIR - Understanding Malware Attack Steps
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Introduction to Threat Hunting & DFIR
- 4 Threat Hunting
- 5 Telemetry Hunt
- 6 Power Shell
- 7 Audit Logging
- 8 Malware Attack Path
- 9 Detections
- 10 Introduction to DFIR
- 11 Digital Forensics
- 12 Memory Forensics
- 13 Skill Required in Threat Hunting
- 14 Skills Useful in Defensive Security
- 15 End