Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.
Traditional hash-based detections are lagging behind when it comes to advanced malware threats. In this course, Threat Hunting with Yara, you will gain the ability to use Yara to identify and clarify malicious artifacts. First you will discover how to write effective rules, next you will craft detections based on patterns identified in suspicious binaries, finally you will explore hunting at scale strategies using Yara rules with other security capabilities. When you’re finished with this course, you will have the skills and the knowledge of hunting for threats with Yara when responding to security incidents.
Author Name: Cristian Pascariu
Author Description:
Cristian took part in auditing and implementation of infosec capabilities to uplift security posture. He managed codification efforts to extract indicators of compromise and created rules in the scope of defending against new emerging threats. He has also developed tools and scripts to overcome security gaps within the corporate network. Cristian has mentored L1 and L2 analysts to increase triage efficiency and combat new threats. He has experience in the field of Application Security and has pr… more
Table of Contents
- Course Overview
1min - Getting Started with Yara
16mins - Identifying Malicious Artefacts
13mins - Writing Detection Rules
17mins - Hunting with Yara
24mins
There are no reviews yet.