Description
Price: 5.00 USD | Size: 1.15 GB | Duration : 4.58 Hours | 53 Video Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 4.9
Threat Intelligence and Threat Hunting, 2nd Edition
“Advanced Threat Intelligence and Threat Hunting Training”
Explore key threat intelligence and threat hunting concepts to help you protect your sensitive data.
A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations.
Throughout the course, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard explanations to explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. By the end of this course, you will be able to protect sensitive data and ensure compliance with privacy regulations, secure systems and applications to prevent data exposure and advise your organization on privacy-by-design principles.
Topics include:
- Threat-Intelligence and Threat-Hunting Concepts
- Analyze Indicators of Potentially Malicious Activity
- Tools or Techniques to Determine Malicious Activity
- Concepts Related to Attack Methodology Frameworks
- Utilizing Threat Intelligence to Support Organization Security
- Analyze Output from Common Vulnerability Assessment Tools
- Threats and Vulnerabilities Associated with Specialized Technology
Skill Level:
- Beginner
Learn How To:
- Apply key threat intelligence and threat hunting concepts
- Understand and classify hot attacks are taking advantage of vulnerabilities
- Use common vulnerability assessment methodologies
- Understand threats against Internet of Things, real-operating systems, and cloud-based environments
Who Should Take This Course:
- Cybersecurity Professionals
- Anyone interested in learning cyber security fundamentals.
Table of Contents
Lesson 1: Threat-Intelligence and Threat-Hunting Concepts
1.1 Threat actorsPart 1
1.2 Threat actorsPart 2
1.3 Confidence levels
1.4 Threat hunting
Lesson 2: Analyze Indicators of Potentially Malicious Activity
2.1 Network-related
2.2 Host-related
2.3 Application-related
2.4 Malicious Activity Indicators
Lesson 3: Tools or Techniques to Determine Malicious Activity
3.1 ToolsPart 1
3.2 ToolsPart 2
3.3 Common techniquesPart 1
3.4 Common techniquesPart 2
3.5 Common techniquesPart 3
3.6 Programming languages/scripting
Lesson 4: Concepts Related to Attack Methodology Frameworks
4.1 Cyber kill chains
4.2 Diamond Model of Intrusion Analysis
4.3 MITRE ATT&CKPart 1
4.4 MITRE ATT&CKPart 2
4.5 Open Source Security Testing Methodology Manual (OSS TMM)
4.6 OWASP Testing Guide
Lesson 5: Utilizing Threat Intelligence to Support Organization Security
5.1 Attack FrameworksPart 1
5.2 Attack FrameworksPart 2
5.3 Threat Research
5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions
5.5 Wireless Analysis Techniques
Lesson 6: Analyze Output from Common Vulnerability Assessment Tools
6.1 Understanding Results
6.2 Web Application Scanners
6.3 Infrastructure Vulnerability Scanner
6.4 Software Assessment Tools and Techniques
6.5 Wireless Assessment
6.6 Cloud Infrastructure Assessment
Lesson 7: Threats and Vulnerabilities Associated with Specialized Technology
7.1 Mobile
7.2 Internet of Things (IoT) and Embedded DevicesPart 1
7.3 Internet of Things (IoT) and Embedded DevicesPart 2
7.4 APTs
7.5 Embedded and Real-Time Operating Systems (RTOS)
7.6 SOC and FPGA
7.7 Physical Access Control
7.8 Building Automation Systems, Vehicles, and Drones
7.9 Industrial Control Systems (ICS) and Process Automation
7.10 Defending Critical Infrastructure
7.11 Supervisory Control and Data Acquisition (SCADA)Part 1
7.12 Supervisory Control and Data Acquisition (SCADA)Part 2
7.13 Verifications and Quality Controls
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.