We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Cyber Threat Hunting

Keatron Evans

This course teaches you the necessary skills to becoming a successful threat hunter. As you progress through the modules, you'll build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.

Enroll now

What's inside

Syllabus

Cyber threat hunting introduction
In this introductory module with Keatron Evans, you'll explore cyber threat hunting: defining it, skills required, hunt modeling with hypotheses, implementation benefits and more.
Read more
Threat hunting artifacts and types
In this module, you'll explore what's needed for a really effective threat-hunting program. You'll also learn about artifacts, indicators of compromise, tactics, techniques and procedures, the Pyramid of Pain and many more insights from Keatron.
Threat hunting techniques and generative AI
Explore the concepts of anomalous activity and investigation. The purpose of this module is to help the threat hunter identify whether an anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away. In this course, Keatron uses generative AI to quickly find malicious activity.
Threat hunting methodologies
In this module, you'll explore the differences between structured and unstructured hunts with Keatron. You will also get into entity-driven hunting.
Threat hunting data and technologies
In this course, Keatron will take you through different data sources that you may hunt through. These include SIEMs, EDR and XDR logs, threat intelligence platforms and several other data sources.
Cyber threat hunting process
In this course, you will learn how to build a hunt. Keatron gets into the details of all the things the learner must consider when building out a hunt and scoping. We also discuss lessons learned and proper execution.
Cyber threat hunting scenarios
In this course, you'll see how different threat hunting scenarios play out. We will use real-world examples to illustrate how we form a hypothesis all the way through lessons learned.
Hunting for network-based threats
In this course, we will go on a deep dive with Keatron concerning network-based threats, including DNS, DDoS and irregular traffic, plus more. This course will include some labs and demonstrations. Locate even the hardest-to-find malware with these techniques.
Hunting for host-based threats
In this course, Keatron will walk through various host-based threats and indicators. There will be labs and demonstrations that include memory forensics, PowerShell and Windows event log parsing.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops threat hunting skills, which are core skills for discovering and mitigating threats
Taught by Keatron Evans, who is recognized for his work in threat hunting
Covers a wide range of threat hunting topics, including threat intelligence, investigation techniques, and remediation methods
Provides hands-on experience with threat hunting tools and techniques
Requires extensive background knowledge in IT and security
Assumes familiarity with threat hunting concepts and terminology

Save this course

Save Cyber Threat Hunting to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Cyber Threat Hunting. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Cyber Threat Hunting will develop knowledge and skills that may be useful to these careers:
Threat Hunter
Threat Hunters are responsible for proactively identifying and hunting for threats to an organization's security. They use a variety of techniques to identify and track threats, and they work to prevent those threats from causing damage. If you want to build a career in cybersecurity, then the Cyber Threat Hunting course is a great resume booster. This course may help you develop the skills you need to become a successful Threat Hunter.
Penetration Tester
Penetration Testers are ethical hackers who are hired to test the security of an organization's computer systems and networks. They work to identify and exploit vulnerabilities before they can be exploited by malicious actors. If you want to build a career in penetration testing, then the Cyber Threat Hunting course is a great place to start. This course will teach you the skills and techniques you need to become a successful Penetration Tester.
Threat Analyst
Threat Analysts are responsible for identifying and assessing threats to an organization's security. They collect and analyze information about potential threats, and they develop and implement strategies to mitigate those threats. If you want to build a career in intelligence and risk management, then consider taking the Cyber Threat Hunting course.
SOC Analyst
Security Operations Center (SOC) Analysts are responsible for monitoring and analyzing security events and incidents. They investigate security alerts, respond to security incidents, and work to prevent future security breaches. If you want to build a career working in a fast-paced environment, monitoring and analyzing security events and incidents, then you should consider the Cyber Threat Hunting course.
Incident Responder
Incident Responders play a critical role in minimizing the damage caused by cyberattacks. An Incident Responder must establish incident response protocols and procedures. They work to contain the damage, restore normal operations, and provide guidance to other teams throughout the incident. If you want to build a career working on the frontlines of network security, helping organizations to respond to and recover from cyberattacks, then you should consider the Cyber Threat Hunting course.
Cloud Security Architect
Cloud Security Architects design, implement, and maintain the security of cloud computing environments. They work to protect cloud-based applications and data from unauthorized access, data breaches, and other threats. If you want to build a career in cloud security, the Cyber Threat Hunting course is a resume booster. It will prepare you with the skills and knowledge to keep your cloud environments secure.
Network Security Engineer
Network security engineers are responsible for designing, implementing, and maintaining the security of an organization's computer networks. They work to protect networks from unauthorized access, denial of service attacks, and other threats. If you want to work in network security, consider the Cyber Threat Hunting course. This course will prepare you with the skills needed to identify and mitigate threats to network security.
Forensic Investigator
Forensic Investigators collect, analyze, and interpret digital evidence to investigate cybercrimes. They work to identify and apprehend cybercriminals and to prevent future cyberattacks. If you want to build a career in digital forensics, consider the Cyber Threat Hunting course. This course may help you develop the skills you need to become a successful Forensic Investigator.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in an organization's computer systems and networks. They work to identify and fix vulnerabilities before they can be exploited by attackers. If you want to build a career in cybersecurity, then consider taking the Cyber Threat Hunting course. This course can help you build a foundation in vulnerability assessment and management.
Security Engineer
Security Engineers are responsible for the security of an organization's computer systems and networks. They install, maintain, and monitor security systems, and they respond to security incidents. If you want to build a career in designing, implementing, and maintaining secure computer systems and networks, then consider taking the Cyber Threat Hunting course.
Cybersecurity Manager
Cybersecurity Managers are responsible for the overall security of an organization's information systems and data. They work to develop and implement security policies and procedures, and they oversee the organization's cybersecurity team. If you want to build a career in cybersecurity management, then consider taking the Cyber Threat Hunting course. This course will help you build a foundation in cybersecurity management and leadership.
Security Architect
Security Architects are in charge of making sure the right security measures are in place to protect the company they work for. They are responsible for ensuring that information is properly protected and that security measures are in place to protect from data breaches. If you wish to create a career in helping organizations design, build, and maintain secure IT systems and networks, then consider the Cyber Threat Hunting course.
Cyber Risk Analyst
Cyber Risk Analysts assess the risks to an organization's information systems and data. They work to identify, analyze, and mitigate these risks. If you want to build a career in cyber risk management, then consider taking the Cyber Threat Hunting course. This course will help you build a foundation in cyber risk assessment and management.
Information Security Analyst
An Information Security Analyst is capable of ensuring that a company's cybersecurity infrastructure is properly in place and constantly being improved upon. They must be skilled in looking for and managing risks, as well as ensuring the company's computer networks and systems are secure. If you want to build a career keeping information safe from unauthorized access, use, disclosure, disruption, modification, or destruction, then the Cyber Threat Hunting course may help get you started.
Cybersecurity Analyst
Cybersecurity Analysts can defend and direct a team to defend against cyberattacks, and the need for these cybersecurity measures is only increasing. Organizations big and small need Cybersecurity Analysts who can monitor and analyze computer networks, systems, and applications for threats and vulnerabilities. If you wish to create a career in building a safe and secure network for organizations and individuals, Cybersecurity Threat Hunting is a course that may be useful.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Threat Hunting.
Provides a deep dive into memory forensics, including how to acquire and analyze memory dumps, how to identify and extract evidence of malware and threats, and how to use memory forensics to investigate and respond to cyber attacks.
Provides a practical guide to network security monitoring, covering techniques for detecting and responding to security incidents.
Provides a comprehensive guide to cloud security, including how to design and implement cloud security solutions, how to secure cloud services, and how to monitor and manage cloud security.
Provides a comprehensive overview of security threats and vulnerabilities, covering topics such as network security, cryptography, and malware analysis.
Provides a comprehensive guide to cybersecurity, including how to protect yourself from cyber threats, how to secure your devices and networks, and how to stay safe online.
Introduces threat modeling as a key aspect of secure system design, providing a practical approach to identifying and mitigating threats to systems and applications.
Explores the human aspect of cybersecurity, providing insights into how attackers use social engineering and other techniques to compromise systems and providing practical advice on how to counter these threats.
Covers the fundamentals of network security assessments, providing a practical approach to identifying and mitigating vulnerabilities in network infrastructure.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cyber Threat Hunting.
Threat Hunting: Review, Automate, and Improve
Most relevant
Threat Hunt with PowerShell
Most relevant
Advanced Threat Hunting and Incident Response
Most relevant
Threat Hunting: Hypothesize and Plan
Most relevant
Specialized Hunts: Threat Hunting within Mail Servers
Threat Investigation
Utilizing Zeek 4 in an Enterprise Environment or for...
Threat Hunt with IBM Security QRadar
Specialized Hunts: Threat Hunting within Active Directory
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser