AI Engineer - Learn how to integrate AI into software applications
Learn EDR Internals: Research & Development From The Masters
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore effective threat hunting techniques in this 58-minute conference talk from BSides Nashville 2017. Delve into the Investigation Process, learn about observation strategies and data-driven observations, and discover the importance of curiosity and experience in cybersecurity. Master basic and realistic pivoting techniques, create investigative pivot charts, and explore common aggregations. Gain insights on building a knowledge base and understand the basic tenets of putting everything in place for successful threat hunting. Enhance your cybersecurity skills with practical tools and methodologies presented by Chris Sanders, emphasizing the importance of always questioning and developing expertise in the field.
Syllabus
Abstract Tools for
Rural Technology Fund
Hunting and Expertise
The Investigation Process
Always Be Questioning
Observation Strategy
Data Driven Observations
Curiosity and Experience
Basic Pivoting
Realistic Pivoting
Create an Investigative Pivot Chart
Explore Common Aggregations
Friendly Intel H&P
Creating a knowledgebase
Everything in Place - Basic Tenants