Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hunt and Gather - Developing Effective Threat Hunting Techniques

RSA Conference via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore effective threat hunting techniques in this 40-minute RSA Conference talk by Tim Bandos, CISO of Digital Guardian. Learn how to stay ahead of hackers through innovative strategies, including application shimming, attack MITRE framework, and Windows admin shares analysis. Discover prerequisites for successful threat hunting, gain insights into system perspectives, and understand how to hunt for lateral movement, network connections, and web shells. Delve into advanced techniques like shim cache hunting, building custom dashboards, and creating proactive signatures. Acquire practical tips to plan, develop, and execute your own threat hunting techniques, leveraging free utilities and best practices shared by an experienced threat hunting team.

Syllabus

Intro
Agenda
What is Threat Hunting
What does it all require
Choosing a model
Application shimming
Attack Miter Framework
Prerequisites
Where do we begin
System perspective
Hunting signature
Account creation
Windows Admin Shares
Windows Event Logs
Executable Launch from Extracted Archive
Job Impression
Hunting Time
Hunting Lateral Movement
Hunting Network Connections
Hunting Web Shells
Advanced Threat Hunting
shim cache hunting
build a hunting dashboard
be proactive
create a dashboard
create custom signatures
download the free utilities
wrap up

Taught by

RSA Conference

Reviews

5.0 rating, based on 1 Class Central review

Start your review of Hunt and Gather - Developing Effective Threat Hunting Techniques

  • Profile image for Samuel Anya Kalu
    Samuel Anya Kalu
    THis is great and indepth fundamentals on Threat hunting. It covers from what Threat Hunting is to what systematic ways there are to search for threats. ALso practical webistes were shared on how to discover breaches that had occured in the past.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.