Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Go to Hunt, Then Sleep

Black Hat via YouTube

Overview

Explore a soothing bedtime tale for threat hunters in this 46-minute Black Hat conference talk. Learn the first five essential hunts to find bad actors and help CISOs rest easy. Discover how to identify hunt targets, find tactics and techniques, map to an attack lifecycle model, and create a hunting plan. Delve into topics such as automation, data exfiltration, lateral movement, industrial control systems, data historians, and machine learning. Gain valuable insights to improve your organization's cybersecurity posture and sleep soundly knowing you're prepared to tackle potential threats.

Syllabus

Introduction
Introductions
A Song of Intel and Planning
Identify Your Hunt Targets
Find Your Tactics and Techniques
Map to an Attack Lifecycle Model
Match Tactics and Techniques
Hunting Plan
Automation
Data Exfiltration
Lateral Movement
Industrial Control System
Data Historian
Machine Learning
Conclusion

Taught by

Black Hat

Reviews

Start your review of Go to Hunt, Then Sleep

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.