Analyst will perform an actual threat hunt on a corporate network modeled after
real-world scenarios and cutting-edge malware. Analyst will propose defense
strategies as part of your evaluation.

After completing this course, Analyst will be able to understand:

  1. Network packet/traffic analysis
  2. Data enrichment with Threat Intelligence
  3. Data correlation
  4. In-depth knowledge of tools such as Wireshark, Redline & IOC editor
  5. IOC-based threat hunting
  6. Memory analysis/forensics
  7. Windows/Linux event analysis
  8. Log analysis
  9. Detection of any stage of the “Cyber Kill Chain” (Information
    Gathering, Exploitation, Post- exploitation)