This module covers the basics of cyber threat hunting in a secure operations center. Students will learn the mindset of the adversary and methods to identify new and emerging cyber threats in an organizational environment. Topics include log analysis, event correlation, open-source threat intelligence, use of AI in threat identification, honeypots, and threat sharing. Students will practice new skills in a simulated threat environment.
Understand the adversarial mindset, characteristics of the adversary and common cyber-attacks, Understand the role of the MITRE Att@ck Framework in understanding stages of a cyber-attack, Analyze and correlate logs from multiple sources, Collect and analyze open source intelligence, Perform basic cyber threat hunting