We are happy to advise you!
Contact
Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) – Outline
Detailed Course Outline
- Threat Hunting Theory
- Threat Hunting Concepts, Frameworks, and Threat Models
- Threat Hunting Process Fundamentals
- Threat Hunting Methodologies and Procedures
- Network-Based Threat Hunting
- Endpoint-Based Threat Hunting
- Endpoint-Based Threat Detection Development
- Threat Hunting with Cisco Tools
- Threat Hunting Investigation Summary: A Practical Approach
- Reporting the Aftermath of a Threat Hunt Investigation