Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Threat Hunting - Demystified

RSA Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the often misunderstood concept of threat hunting in this 31-minute conference talk from RSA Conference. Delve into the world of unknown unknowns as Managing Principal Ashish Thapar from Verizon demystifies threat hunting and its importance as an effective cyber-defense strategy. Learn about the threat landscape, detection gaps, and a five-phase threat hunting model. Discover how to find evil in the sea of noise and examine a sample use case for hunting command and control (C2) activities. Gain insights into the ten commandments for effective threat hunting, including how to gauge your organization's cyber maturity level. Equip yourself with the knowledge to keep adversaries at bay and strengthen your cybersecurity posture through proactive threat hunting techniques.

Syllabus

Intro
THANK YOU TO OUR COMMUNITY PARTNER
Threat Landscape
Finding Evil - In the Sea of Noise
The Detection Gap
Demystifying Threat Hunting
Threat Hunting Model - The Fabulous Five
Threat Hunting Model - Phase 1
Threat Hunting Model - Phase 4
Threat Hunting Model - Phase 5
Sample Use Case: Hunting for C2
Ten Commandments for Effective Threat Hunting 1. Gauge your cyber maturity level

Taught by

RSA Conference

Reviews

Start your review of Threat Hunting - Demystified

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.