AND 价值647美元的威胁情报课程(中英双语字幕)

介绍:

原老外的课程链接:

https://www.networkdefense.co/courses/hunting/

结构化的系统,确保您永远不会不知从何入手寻找恶意攻击。实用威胁搜寻是一门基础课程,它将教您如何使用经过验证、结构化且可重复的框架进行威胁搜寻。实用威胁搜寻课程将教您如何以最佳方式进行威胁搜寻,让您永远不会缺少切入点或操纵数据以发现异常的技术。您将通过一系列专家指导的讲座、基于场景的演示和动手实验来提升技能。通过理论与应用相结合的课程,您将学习威胁搜寻的基础知识,并立即将其应用于您的网络。

教学大纲

  • 两种狩猎框架:基于攻击的狩猎(ABH)和基于数据的狩猎(DBH)
  • 利用威胁情报和 MITRE ATT&CK 框架进行输入追踪的技术
  • 审查证据时会遇到的 9 种最常见的异常类型。
  • 威胁猎手转换数据以发现异常的四种最常见方式
  • 各种规模的组织中典型的猎头人员配置模型及其优缺点
  • 支持并实现威胁搜寻行动的 5 个指标
  • 我在狩猎时有效记录笔记的两步系统(以及如何将这些笔记转换为长期存储以便于搜索)
  • 猎人维基/知识库的理想设计

为狩猎行动做准备的五步框架,用于分析和模拟攻击

d2b5ca33bd20250430225632

目录:

├── 01. Course Introduction
│   └── 1. Course Welcome and Approach.mp4
├── 02. Overview of the Hunting Process
│   ├── 1. The Investigation Process, Where Hunting Fits In, And Hunting Defined.mp4
│   ├── 2. Attack-Based Hunting (ABH) Overview.mp4
│   ├── 3. Working through an ABH Example.mp4
│   ├── 4. Data-Based Hunting (DBH) Overview.mp4
│   └── 5. Working through a DBH Example.mp4
├── 03. Anomaly Detection
│   ├── 1. Subject vs. Context Anomalies and the Eye Test.mp4
│   ├── 2. Common Anomaly Types 1.mp4
│   ├── 3. Common Anomaly Types 2.mp4
│   └── 4. Common Anomaly Types 3.mp4
├── 04. The Lab Network
│   ├── 1. Accessing the Lab
│   │   └── pth-analyst-vmware-1.0.zip
│   └── 2. Lab Tools Walkthrough.mp4
├── 05. Hunting Labs - Anomaly Spotting
│   ├── 1. Hunting Lab 1.mp4
│   └── 2. Hunting Lab 2.mp4
├── 06. Data Transformation
│   ├── 01. The GAPSS Model for Hunters.mp4
│   ├── 02. Search Strategies.mp4
│   ├── 04. Mastering Any Search Tool 1.mp4
│   ├── 05. Mastering Any Search Tool 2.mp4
│   ├── 06. Aggregations - Concepts.mp4
│   ├── 07. Aggregations - Tools.mp4
│   ├── 08. Aggregations - In Practice.mp4
│   ├── 09. Simple Statistics for Anomaly Hunting.mp4
│   ├── 10. More Statistics for Anomaly Hunting.mp4
│   └── 11. Context Switching with Pivots.mp4
├── 07. Threat Intelligence and Attack Dissection
│   ├── 1. Attack Dissection Overview and Collecting Examples.mp4
│   ├── 2. Identifying Entities, Relationships, and Steps.mp4
│   ├── 3. Simulating Attacks (+Detection Lab).mp4
│   ├── 4. Mapping Attack Steps to Evidence.mp4
│   └── 5. Correlating Evidence to Expected Anomaly Types.mp4
├── 08. Hunting Labs - ABH
│   ├── 1. Hunting Lab 3.mp4
│   └── 2. Hunting Lab 4.mp4
├── 09. Hunting in your Organization
│   ├── 1. Enabling Hunting in your Organization without the BS.mp4
│   ├── 2. 3 Common Operational Hunting Models.mp4
│   ├── 3. Metrics to Gain and Keep Organizational Support.mp4
│   ├── 4. Must-Have Hunting Data Sources and Tools.mp4
│   └── 5. The Hunt Once Principle.mp4
├── 10. Hunting Knowledge Management
│   ├── 1. My Two-Step System for Documenting Hunting Knowledge.mp4
│   ├── 2. Constructing the Hunter's Wiki - Principles and Software.mp4
│   └── 3. Constructing the Hunter's Wiki - Structure.mp4
├── 11. Hunting Labs - DBH
│   ├── 1. Hunting Lab 5.mp4
│   └── 2. Hunting Lab 6.mp4
├── 12. Course Conclusion
│   └── 1. Course Conclusion and Next Steps.mp4
├── Lab
│   ├── Hunting Tool Recommendations.pdf
│   └── pth_data
│       ├── __MACOSX
│       │   └── pth_data
│       │       ├── ._.DS_Store
│       │       └── pdfs
│       │           ├── ._Hunting Expedition Ideas.pdf
│       │           ├── ._Hunting Tool Recommendations.pdf
│       │           ├── ._Hunting Wiki Construction.pdf
│       │           ├── ._Kibana Searches.pdf
│       │           └── ._Twitter Follows.pdf
│       └── pth_data
│           ├── .DS_Store
│           ├── pdfs
│           │   ├── Hunting Expedition Ideas.pdf
│           │   ├── Hunting Tool Recommendations.pdf
│           │   ├── Hunting Wiki Construction.pdf
│           │   ├── Kibana Searches.pdf
│           │   └── Twitter Follows.pdf
│           └── scenarios
│               ├── lab1
│               │   ├── import.sh
│               │   └── lab1.zip
│               ├── lab2
│               │   ├── import.sh
│               │   └── lab2.zip
│               ├── lab3
│               │   ├── import.sh
│               │   ├── lab3-1.zip
│               │   ├── lab3-2.zip
│               │   ├── lab3-3.zip
│               │   ├── lab3-4.zip
│               │   └── lab3-5.zip
│               ├── lab4
│               │   ├── import.sh
│               │   └── lab4.zip
│               ├── lab5
│               │   ├── import.sh
│               │   └── lab5.zip
│               └── lab6
│                   ├── import.sh
│                   └── lab6.zip

下载链接:

 

AND 价值647美元的威胁情报课程(中英双语字幕)-棉花糖会员站
AND 价值647美元的威胁情报课程(中英双语字幕)
此内容为付费阅读,请付费后查看
会员专属资源
您暂无购买权限,请先开通会员
付费阅读
已售 65
© 版权声明
THE END
喜欢就支持一下吧
点赞45赞赏 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容