4.6 out of 5
4.6
5 reviews on Udemy

EDR: Threat Hunting & Threat Intelligence

Learning how to be a Threat Hunter, Intelligence, and EDR Leader
Instructor:
Michael Goedeker
75 students enrolled
English [Auto]
People who need to work with EDR
People who work in Threat Hunting
People Interested in Security or SOCs
Someone who wants to develop their skills in Threat Hunting EDR or Threat Intelligence

Are you ready to take your cybersecurity skills to the next level? Join us in this exciting course on EDR: Threat Hunting & Threat Intelligence! In today’s rapidly evolving digital landscape, organizations need experts to detect and neutralize threats to their networks and systems proactively. This course gives you the knowledge and tools to become a skilled threat hunter and effectively leverage threat intelligence.

Through a hands-on approach, you’ll learn how to leverage Endpoint Detection and Response (EDR) tools to detect, investigate, and respond to potential threats. We’ll dive deep into cybercriminals’ tactics, techniques, and procedures (TTPs) and explore how to develop a proactive mindset to stay one step ahead. With a strong focus on practical application, you’ll gain real-world experience in threat hunting, using advanced techniques to uncover hidden threats within your organization.

Additionally, this course will give you the skills to leverage threat intelligence effectively. You’ll learn to collect, analyze, and apply threat intelligence data to enhance your threat-hunting capabilities. By understanding the motivations and strategies of threat actors, you can anticipate their next moves and effectively defend your organization’s assets.

Key Topics Covered:

  1. Introduction to EDR: Understanding the Basics

  2. Threat Hunting Methodologies and Techniques

  3. Leveraging EDR Tools for Threat Hunting

  4. Advanced Threat Hunting Techniques and Tactics

  5. Analyzing Threat Intelligence Data

  6. Applying Threat Intelligence in Threat Hunting

  7. Incident Response and Remediation Strategies

  8. Improving Security Posture through Threat Hunting

Why Enroll in This Course?

  • Gain practical skills in threat hunting and threat intelligence.

  • Learn from industry experts with hands-on experience.

  • Develop a proactive mindset to identify and neutralize threats.

  • Enhance your organization’s security posture.

  • Stay updated with the latest trends and techniques in cybersecurity.

  • Join a supportive community of like-minded professionals.

Who Should Attend?

  • Cybersecurity professionals seeking to enhance their threat-hunting skills.

  • Incident responders and SOC analysts looking to expand their knowledge.

  • IT professionals responsible for network and system security.

  • Security operations team members interested in leveraging threat intelligence effectively.

  • Anyone passionate about cybersecurity and eager to learn new techniques.

Take advantage of this opportunity to become a skilled threat hunter and leverage threat intelligence effectively. Enroll in EDR: Threat Hunting & Threat Intelligence today and secure your organization against evolving cyber threats!

EDR, Threat Hunting and Threat Intelligence

1
Introduction
  • Explanation of what threat hunting, threat intelligence and EDR are

  • Importance of these concepts in modern cybersecurity

2
Understanding the Threat Landscape
  • Overview of the current threat landscape

  • Common types of cyberattacks

  • Examples of high-profile attacks

3
Introduction to Threat Hunting
  • Definition of threat hunting

  • The Role of threat hunting in Cybersecurity

  • Benefits of threat hunting

4
Threat Hunting Techniques
  • Overview of Common threat hunting techniques

  • Benefits and drawbacks of each technique

  • Best practices for implementing threat-hunting techniques

5
Building a Threat-Hunting Program
  • Critical components of a successful threat-hunting program

  • Steps for Building a threat-hunting Program

  • Tips for measuring the success of a threat-hunting program

6
Threat Intelligence
  • Definition of threat intelligence

  • The Role of threat intelligence in Cybersecurity

  • Types of threat intelligence

7
Threat Intelligence Sources
  • Overview of common threat intelligence sources

  • Benefits and drawbacks of each source

  • Best practices for using threat intelligence sources

8
Threat Intelligence Platforms
  • Overview of common threat intelligence platforms

  • Advantages and disadvantages of each platform

  • Best practices for using threat intelligence platforms

9
Threat Intelligence Sharing
  • The importance of sharing threat intelligence

  • Overview of common threat intelligence sharing platforms

  • Benefits and drawbacks of each platform

  • Best practices for sharing threat intelligence

10
Introduction to EDR
  • Definition of EDR

  • The Role of EDR in Cybersecurity

  • Benefits of EDR

11
EDR Capabilities
  • Overview of standard EDR capabilities

  • Benefits and drawbacks of each capability

  • Best practices for using EDR capabilities

12
EDR Implementation
  • Steps for implementing EDR

  • Best practices for configuring EDR

  • Tips for measuring the success of EDR

13
EDR Integration with Other Tools
  • Overview of standard tools that EDR can integrate with

  • Benefits and drawbacks of each integration

  • Best practices for integrating EDR with other tools

14
EDR Use Cases
  • Examples of common EDR use cases

  • Advantages and disadvantages of each use case

  • Best practices for using EDR in specific situations

15
Threat Hunting with EDR
  • The Role of EDR in threat hunting

  • Benefits of using EDR for threat hunting

  • Best practices for using EDR for threat hunting

16
Threat Intelligence with EDR
  • The Role of EDR in threat intelligence

  • Benefits of using EDR for threat intelligence

  • Best practices for using EDR for threat intelligence

17
EDR and Incident Response
  • The part of EDR in incident response

  • Benefits of using EDR for incident response

  • Best practices for using EDR for incident response

18
EDR and Compliance
  • Overview of common compliance frameworks

  • How EDR can help with compliance

  • Best practices for using EDR for compliance

19
EDR and Cloud Security
  • The Role of EDR in cloud security

  • Benefits of using EDR for cloud security

  • Best practices for using EDR for cloud security

20
EDR and Endpoint Security
  • The Role of EDR in endpoint security

  • Benefits of using EDR for endpoint security

  • Best practices for using EDR for endpoint security

21
Future of Threat Hunting, Threat Intelligence, and EDR
  • Predictions for the future of these concepts

  • Emerging technologies that will impact these concepts

  • Best practices for staying current with the latest developments

22
Opensource Tools and Solutions forThreat Hunting, Threat Intelligence, and EDR
  • Open-source tools for Threat Intelligence

  • Open-source tools for Threat Hunting

  • Open-source tools for EDR

23
End of Course Exam
24
Carbon Black EDR Std

This lecture shows some examples of administering, rolling out, and using Carbon Black Std EDR Solution.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
5 Ratings

Detailed Rating

Stars 5
4
Stars 4
1
Stars 3
1
Stars 2
0
Stars 1
0