Türkiye Siber Güvenlik Kümelenmesi - Yükleniyor...

Menü

Üye Ol

Giriş Yap

Öğrenme İçeriği

• Introduction the Threat Hunting • What Motivates Cyber Attacks • What are the Cyber Attack Methods • Attacker Who Prepare Cyber Attack • Place Where Prepare Cyber Attack • Threat Hunting Fundamentals • Pyramid of Pain • TTP - Tactics, Techniques and Procedure • IOC - Indicators of Compromise • STIX - Structed Threat Information Expression • Cybox - Cyber Observable eXpression • IOC Scanners • OODA Loop • Cyber Kill Chain Model • MITRE ATT&CK Model • Fireeye Attack Lifecycle • Threat Intelligence • OSINT - Open Source Intelligence • Honeypots • Dark Web • Collect data on Network Equipment • Threat Intelligence Feed and Sharing • Strategic Cyber Threat Intelligence • Operational Cyber Threat Intelligence • Tactical Cyber Threat Intelligence • Threat Hunting Methodologies • Hunting • Feature extraction • Behavior extraction • Correlation • Attribution • Tracking

Hedef Kitle

IT Personeli, SOME Personeli,Purple Team Üyesi, Güvenlik Analisti

Eğitim Detayları

Eğitim Metodu
Süre
Dil