Cybersecurity
Showing 1213–1224 of 1317 results
Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.
Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.
Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.
Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.
Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.
Threat Hunting: Network Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.
Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.
Threat Intelligence with MISP
In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
Threat Intelligence with MSTICPy
This course will focus on using MSTICPy in notebooks to detect adversary logons, decode obfuscated scripting attacks, and attempts to establish persistence.
Threat Intelligence: The Big Picture
This course provides a solid baseline for cyber threat intelligence. You will learn how to leverage intelligence to understand adversary behavior and make use of indicators of compromise to detect and stop malware.
Threat Modeling Fundamentals
Threat modeling can help mitigate security risks in an application in a repeatable and efficient way. This course teaches you the fundamentals of threat modeling and what the different approaches and methodologies are.