Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Master Anomaly Detection - Advanced Threat Hunting for Identity-Based Attacks

Red Canary via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Join threat hunting experts Tyler Winchester and Brittany Sattler in this 37-minute Red Canary Office Hours episode as they explore advanced methodologies for detecting identity-based threats that evade automated security systems. Dive deep into a comprehensive case study demonstrating how to identify compromised identities through adversary-in-the-middle phishing attacks by analyzing authentication patterns across multiple data centers within specific time windows. Learn practical approaches to establishing user behavior baselines, developing effective hunt hypotheses, and integrating organizational intelligence to differentiate between legitimate and malicious activities. Discover how to overcome the unique challenges of identity threat detection compared to traditional endpoint security, utilize pseudocode for developing hunt methodologies, and leverage analytical tools like Jupyter Notebooks for data investigation. Master the art of combining external threat intelligence with internal business context to enhance detection accuracy while minimizing false positives from common scenarios such as impossible travel alerts and VPN usage patterns.

Syllabus

00:00 - 00:50 - Intro
00:51 - 03:30 - Welcome to Red Canary Office Hours
03:31 - 37:03 - Naughty or nice? Decoding normal vs. anomalous behavior

Taught by

Red Canary

Reviews

Start your review of Master Anomaly Detection - Advanced Threat Hunting for Identity-Based Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.