Course Code: customizedthreathunting
Duration: 8 hours
Prerequisites:
  • An understanding of ___.
  • Experience with ___.
  • ___ programming experience.

Audience

  • ___
  • ___
  • ___
Course Outline:

Cap #1:

Overview: an introduction to Threat Hunting including what is it about, benefits and how does it work along with other defensiveactivities.

Main Topics

• Threat Hunting- Blue team and Red team activities

• Data collection & preparation- Threat hunting phases

Cap #2

Overview: building Python tools to monitor networks and identify probable attacks.

Main Topics

• Building log collection and analyzing tool using Python

• Threat Hunting through log analysis

Cap #3: Overview: building a specialized threat hunting tool for capturing specific kind of attacks.

Main Topics

• Introduction to web application vulnerabilities OWASP top 10

• SQL Injection vulnerability and attacks

• Building Python tool to collect and identify attack signatures

• How XSS works

• Building Python tool to hunt XSS attacks

Cap #4: An overview Using AI in Threat Hunting.

Main Topics:

 • Gathering system logs and creating datasets

• Building predictive model using system logs

• Using AI model to identify possible threats

• Improving threat hunting accuracy using AI