This course will start you on your journey to become a Threat Hunter. You will learn the tools that these defensive specialists use to proactively hunt for advanced threats that are hiding inside the network.
Teaches the following tools:
- Mandiant IOC Collector
- MD5 Hashing
- SHA-1 Hashing
- File Properties
- Mandiant Redline
- Virtual Machines
And the following practical activities:
- Generating Indicators of Compromise
- Hunting for Files
- Course Challenge: Malware Threat Hunt
All content is copyrighted by Security Blue Team, unless otherwise quoted with a source.
By purchasing this product you agree that you have read and understand our Returns Policy.