Welcome to our course for Threat Hunting! This specialised purple-team role focuses on detecting advanced threats that are already within the network, and have so far remained undetected. Using both manual and automated techniques, Threat Hunters search for malicious artefacts over the network and on systems. This role is highly technical and is ever-changing, as adversaries change their tactics, hunters must develop new tools and methods for discovering signs of threats that traditional security controls haven’t detected yet.
By purchasing this course you agree that you have read and understand our Refunds Policy.
Below are the practical aspects that are included in this course, giving you a chance to put the knowledge you’ve learned into practice, and gain some hands-on experience.
generating indicators of compromise
You’ll learn what Indicators of Compromise are, and how to generate your own for files. These will be used in the next challenge where you will search a system using these IOCs to find evidence of various files and malware that is hiding.
You’ll learn how to use IOCs to search an entire system for any evidence of them, allowing you to identify suspicious or malicious files used values such as strings, MD5 hashes, file names, file size, and more.
You will be given a system image, which you must load as a virtual machine, and use techniques to generate IOCs from two malware samples, and then search the system to find all other copies of the malware that are hidden deep inside
Below is a list of the tools and services that this course will teach you how to use. Some tools or services may be missing from this list, so it should not be treated as a complete index for everything within the course.
Mandiant IOC Collector
MD5 Hashing
SHA-1 Hashing
Strings
File Properties
Mandiant Redline
Virtual Machines
If you complete the final exam, you will be eligible to receive an e-certificate showing that you have completed this course and developed your network analysis fundamental skills! Great for sharing on LinkedIn to showcase your motivation and drive to develop your skills (plus we love hearing from our students!)
All content in this course is Copyrighted by Security Blue Team 2020. Any copying, redistributing, or sharing in any way to non-paying students is an unlawful breach of this copyright, and will result in legal action to claim for damages.
This website uses cookies to improve your experience. We do not share your data with any 3rd parties. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Login
Accessing this course requires a login. Please enter your credentials below!