Coursera
Coursera Logo

Infosec - Cyber Threat Hunting 

  • Offered byCoursera
  • Public/Government Institute

Cyber Threat Hunting
 at 
Coursera 
Overview

Duration

7 hours

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cyber Threat Hunting
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum

Cyber Threat Hunting
 at 
Coursera 
Highlights

  • Shareable Certificate
    Quizzes and assessments
    Flexible schedule
Details Icon

Cyber Threat Hunting
 at 
Coursera 
Course details

More about this course
  • Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make threat hunting more effective
  • This learning path progresses through six courses, in which learner will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods
  • Upon completion, learner will have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise

Cyber Threat Hunting
 at 
Coursera 
Curriculum

Introduction to Cyber Threat Hunting Techniques

Instructor introduction and course outline

What is cyber threat hunting?

Cyber threat hunting frameworks

Passion is required!

Networking technology knowledge: connectivity and IP addresses

Networking technology knowledge: the network stack and the OSI model

Networking technology knowledge: NAT/PAT

Networking technology knowledge: identifying IP sources and destinations

Operating systems/cloud computing/hosting

Security mitigation and monitoring tools

Programming and scripting skills

Vital scripts, programs, and commands

Understanding threat landscapes, layered security and posture

Introduction to Cyber Threat Hunting Quiz

Detect

Visibility tools

Logging sources

Traffic monitoring

Network and network device monitoring

Visibility tools examples

Using Linux and open-source tools

Network bandwidth/traffic monitoring tools

PRTG

Tcpdump

Tcpdump Top Talkers

ntop

IDS/IPS: Suricata and Snort

Online threat hunting tools

MITRE ATT&CK

Threat Crowd, Shodan

SEIM tools

Tailoring SIEM

Creating your dashboard

Setting up alerts

Source setup and logging

Setting up access

Setting up access part 2

Setting up alerts and filters

Testing your filters demo

Detect Quiz

Investigate

Identify anomalous activity

Identify, investigate and analyze demo

Investigate Anomalies Quiz

Remediate

Determine nature of attack, remediate, review and recommend

Tools for exploit prevention

Logging tools

Phishing email incidents

Host intrusion prevention systems (HIPS), system lockdown, and testing endpoint protection

Remediate Quiz

Attack Simulation

Sim tools defined

Attack simulation tools for Blue/Red teams

Malware demo

Attack Simulation Quiz

Cyber Threat Hunting Review

Detect, identify, and remediate recap

Other threat hunting duties

Final Quiz

Cyber Threat Hunting Project

Cyber threat hunting project walkthrough

Cyber threat hunting hints

Traffic analysis exercise

Cyberthreat hunting challenges

Cyber threat hunting challenge answers

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6726 CoursesRight Arrow Icon
qna

Cyber Threat Hunting
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...