Showing 16933–16944 of 18767 results
This is Such a Pain: The Role of Empathy in Design
Bad experiences. We all have them, it’s that moment we feel so frustrated we just want to shout “This is such a pain in the ***!" This is the phrase an experience designer lives for, but who really is an experience designer?
Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.
Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.
Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.
Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.
Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.
Threat Hunting: Network Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.
Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.
Threat Intelligence with MISP
In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
Threat Intelligence with MSTICPy
This course will focus on using MSTICPy in notebooks to detect adversary logons, decode obfuscated scripting attacks, and attempts to establish persistence.
Threat Intelligence: The Big Picture
This course provides a solid baseline for cyber threat intelligence. You will learn how to leverage intelligence to understand adversary behavior and make use of indicators of compromise to detect and stop malware.