- An understanding of ___.
- Experience with ___.
- ___ programming experience.
Audience
- ___
- ___
- ___
Cap #1:
Overview: an introduction to Threat Hunting including what is it about, benefits and how does it work along with other defensiveactivities.
Main Topics
• Threat Hunting- Blue team and Red team activities
• Data collection & preparation- Threat hunting phases
Cap #2:
Overview: building Python tools to monitor networks and identify probable attacks.
Main Topics
• Building log collection and analyzing tool using Python
• Threat Hunting through log analysis
Cap #3: Overview: building a specialized threat hunting tool for capturing specific kind of attacks.
Main Topics
• Introduction to web application vulnerabilities OWASP top 10
• SQL Injection vulnerability and attacks
• Building Python tool to collect and identify attack signatures
• How XSS works
• Building Python tool to hunt XSS attacks
Cap #4: An overview Using AI in Threat Hunting.
Main Topics:
• Gathering system logs and creating datasets
• Building predictive model using system logs
• Using AI model to identify possible threats
• Improving threat hunting accuracy using AI