Course curriculum

    1. Course Intro

    2. M1L1V1_Overview of Threat Hunting Concepts and Importance

    3. M1L1V2-How to Plan Threat Hunt

    4. M1L1V3_How to Document Threat Hunt

    1. M1L2V1-Hunting Methodologies

    2. M1L2V2-Telemetry and Data Sources

    3. M1L2V3_Essential Tools for Threat Hunting

    1. M1L3V1 - Explore MITRE ATT_CK

    2. M1L3V2_How to Use MITRE Navigator_

    3. M1L3V3-From ATT_CK to Action Building a Hunt Matrix for Real Threats

    1. M2L1V1-Parsing and Cleaning Logs

    2. M2L1V2 Techniques for Log Parsing and Cleaning Part 1

    3. M2L1V3 Techniques for Log Parsing and Cleaning Part 2

    1. M2 L2V3_Threat Hunting Visualization_

    2. M2L2V1_Introduction to Feature Engineering_

    3. M2L2V2-Visualizing Behaviors

    1. M2 L3V2_Create Your Own Visualization

    2. M2 L3V3_Top Security Visualizations Every Threat Hunter Should Use

    3. M2L3V1 What is Security-Focused Visualization

About this course

  • Free
  • 38 lessons
  • 4 hours of video content

Discover your potential, starting today