Главная
Study mode:
on
1
Introduction
2
Agenda
3
Introduction to Threat Hunting & DFIR
4
Threat Hunting
5
Telemetry Hunt
6
Power Shell
7
Audit Logging
8
Malware Attack Path
9
Detections
10
Introduction to DFIR
11
Digital Forensics
12
Memory Forensics
13
Skill Required in Threat Hunting
14
Skills Useful in Defensive Security
15
End
Description:
Explore the world of Cyber Threat Hunting and Digital Forensics and Incident Response (DFIR) in this comprehensive 47-minute video. Delve into the steps involved in identifying and mitigating malware attacks, and understand the critical role of DFIR in cybersecurity. Learn about threat hunting techniques, including telemetry hunts and PowerShell analysis, as well as the importance of audit logging. Examine the malware attack path and various detection methods using event logs, rules, and ETW artifacts. Gain insights into digital forensics, memory forensics, and the skills required for effective threat hunting and defensive security. Whether you're a beginner or an experienced professional, acquire valuable knowledge to strengthen your organization's defense against cyber threats and advance your career in the cybersecurity field.

Cyber Threat Hunting and DFIR - Understanding Malware Attack Steps

INFOSEC TRAIN
Add to list
0:00 / 0:00