- Level Professional
- Duration 8 hours
- Course by Infosec
-
Offered by
About
Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.Modules
Introduction to cyber threat hunting techinques
5
Videos
- Course and instructor introduction
- What is cyber threat hunting?
- Implementation considerations
- Threat hunting models
- Benefits of threat hunting
Threat hunting artifacts and types
4
Videos
- Introduction to artifacts and indicators of compromise (IOCs)
- Artifacts and types
- Indicators of compromise
- Tactics, techniques and procedures (TTPs)
Threat hunting techniques and generative AI
6
Videos
- Introduction to techniques
- Aggregation of data sources
- Anomalies and baselining
- Grouping and clustering with AI
- Generative AI in threat hunting
- Generative AI in practice demo
Methodologies
4
Videos
- Introduction to methodologies
- Structured hunting (MITRE)
- Unstructured hunting
- Entity driven hunting
Threat hunting data and technologies
6
Videos
- Data and technologies
- Network data
- Endpoint data
- Security information and event management (SIEM)
- Threat intelligence platforms
- Ticketing/SOAR
Identifying the activity
4
Videos
- Threat hunting process introduction
- Scoping and hypothesis development
- Execution
- Cyber threat hunting: Lessons learned
Remediate
4
Videos
- Structured hunt scenario
- Unstructured hunt scenario
- Entity-driven hunt scenario
- Situation-driven hunt scenario
Attack Simulation
5
Videos
- Network threats
- DNS abnormalities
- Hunting for (distributed-denial-of-service) DDoS activity
- Hunting for suspicious domains
- Hunting for irregular traffic
Detect, identify, and remediate recap
1
Assignment
- End of course assessment
9
Videos
- Host-based threats
- Malware
- Hunting for irregular processes
- Detecting lateral movement
- Hunting for malicious files
- Database swells
- Host triage
- Finding a well-hidden rootkit
- Using VirusTotal for validation
Auto Summary
Dive into the world of cyber threat hunting with this professional-level course from Coursera. Designed for IT and computer science enthusiasts, it covers essential skills like intelligence gathering, investigation techniques, and remediation methods. Over 480 minutes, you'll learn to proactively defend against data compromises. Subscription options include Starter and Professional plans. Perfect for those aiming to enhance their cybersecurity expertise.

Keatron Evans