When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

pluralsight logo

Threat Hunting: Network Hunting

Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.

     
  • 5
  •  |
  • Reviews ( 26 )
Free

This Course Includes

  • iconpluralsight
  • icon5 (26 reviews )
  • icon1 hour 29 minutes
  • iconenglish
  • iconOnline - Self Paced
  • iconcore courses
  • iconpluralsight

About Threat Hunting: Network Hunting

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Network Hunting, you'll learn to hunt for specific APT techniques found in network data. First, you'll explore the data sets and importance of centralized network collection. Next, you'll discover how to search for phishing and C2 artifacts. Finally, you'll learn how to detect behaviors related to lateral movement and any objectives the adversary is attempting to accomplish. When you're finished with this course, you'll have the skills and knowledge of network hunting needed to provide the proactive approach to security analytics.

What You Will Learn?

  • Course Overview : 1min.
  • Normalizing the Traffic : 19mins.
  • Phishing : 13mins.
  • Command and Control : 28mins.
  • Lateral Movement : 16mins.
  • Actions on Objective : 10mins.