Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the often misunderstood concept of threat hunting in this 31-minute conference talk from RSA Conference. Delve into the world of unknown unknowns as Managing Principal Ashish Thapar from Verizon demystifies threat hunting and its importance as an effective cyber-defense strategy. Learn about the threat landscape, detection gaps, and a five-phase threat hunting model. Discover how to find evil in the sea of noise and examine a sample use case for hunting command and control (C2) activities. Gain insights into the ten commandments for effective threat hunting, including how to gauge your organization's cyber maturity level. Equip yourself with the knowledge to keep adversaries at bay and strengthen your cybersecurity posture through proactive threat hunting techniques.
Syllabus
Intro
THANK YOU TO OUR COMMUNITY PARTNER
Threat Landscape
Finding Evil - In the Sea of Noise
The Detection Gap
Demystifying Threat Hunting
Threat Hunting Model - The Fabulous Five
Threat Hunting Model - Phase 1
Threat Hunting Model - Phase 4
Threat Hunting Model - Phase 5
Sample Use Case: Hunting for C2
Ten Commandments for Effective Threat Hunting 1. Gauge your cyber maturity level
Taught by
RSA Conference