This module covers the basics of cyber threat hunting in a secure operations center. Students will learn the mindset of the adversary and methods to identify new and emerging cyber threats in an organizational environment. Topics include log analysis, event correlation, open-source threat intelligence, use of AI in threat identification, honeypots, and threat sharing. Students will practice new skills in a simulated threat environment.
Learning Objectives
Understand the adversarial mindset, characteristics of the adversary and common cyber-attacks, Understand the role of the MITRE Att@ck Framework in understanding stages of a cyber-attack, Analyze and correlate logs from multiple sources, Collect and analyze open source intelligence, Perform basic cyber threat hunting
Framework Connections
Specialty Areas
- Collection Operations
- Cyber Defense Analysis
- Cyber Investigation
- Risk Management
- Training, Education, and Awareness
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.