This course is focused on the methodologies and processes used by professional "Hunt" teams in corporate and government spaces. Instructors, with multiple years of Hunt experience, use open-source tools to teach students the necessary skills to successfully identify malicious behavior not caught by traditional security products. Students will set up security products and use analytic tools on a mock network to ensure they understand the capabilities of traditional security measures, as well as the gaps. Students will learn how to implement signatures and analyze heuristics to identify anomalous behavior. They will provide written reports for each behavior they identify and build actor profiles based off their findings. They will use timeline analysis and log analysis to map out the incident. Using incident response techniques, they will take the data collected and implement real-time solutions to the customer while providing risk management analysis to help protect networks in the future.
Take the first step on your path to greatness.
To learn more about the Chiron Methodology and Training Portfolio, please contact our Customer Support team.