In this module, we’ll tackle ways to hunt known Tactics, Techniques and Procedures (TTPs) using different methodologies of threat hunting. You will learn to effectively differentiate benign and malicious activity from a large dataset of logs ingested in a SIEM. Additionally, you will be tasked to hunt and investigate scenarios that typically occur in real life.
Loading rooms...
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).