Đề cương khóa học
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- High-level EDR architecture and OpenEDR components
- Review of MITRE ATT&CK framework and threat-hunting fundamentals
OpenEDR Deployment & Telemetry Collection
- Installing and configuring OpenEDR agents on Windows endpoints
- Server components, data ingestion pipelines, and storage considerations
- Configuring telemetry sources, event normalization, and enrichment
Understanding Endpoint Telemetry & Event Modeling
- Key endpoint event types, fields, and how they map to ATT&CK techniques
- Event filtering, correlation strategies, and noise reduction techniques
- Creating reliable detection signals from low-fidelity telemetry
Mapping Detections to MITRE ATT&CK
- Translating telemetry into ATT&CK technique coverage and detection gaps
- Using ATT&CK Navigator and documenting mapping decisions
- Prioritizing techniques for hunting based on risk and telemetry availability
Threat Hunting Methodologies
- Hypothesis-driven hunting vs indicator-led investigations
- Hunt playbook development and iterative discovery workflows
- Hands-on hunting labs: identifying lateral movement, persistence, and privilege escalation patterns
Detection Engineering & Tuning
- Designing detection rules using event correlation and behavioral baselines
- Rule-testing, tuning to reduce false positives, and measuring effectiveness
- Creating signatures and analytic content for reuse across the environment
Incident Response & Root Cause Analysis with OpenEDR
- Using OpenEDR to triage alerts, investigate incidents, and timeline attacks
- Forensic artifact collection, evidence preservation, and chain-of-custody considerations
- Integrating findings into IR playbooks and remediation workflows
Automation, Orchestration & Integration
- Automating routine hunts and alert enrichment using scripts and connectors
- Integrating OpenEDR with SIEM, SOAR, and threat intelligence platforms
- Scaling telemetry, retention, and operational considerations for enterprise deployments
Advanced Use Cases & Red Team Collaboration
- Simulating adversary behavior for validation: purple-team exercises and ATT&CK-based emulation
- Case studies: real-world hunts and post-incident analyses
- Designing continuous improvement cycles for detection coverage
Capstone Lab & Presentations
- Guided capstone: full hunt from hypothesis through containment and root cause analysis using lab scenarios
- Participant presentations of findings and recommended mitigations
- Course wrap-up, materials distribution, and recommended next steps
Yêu cầu
- An understanding of endpoint security fundamentals
- Experience with log analysis and basic Linux/Windows administration
- Familiarity with common attack techniques and incident response concepts
Audience
- Security operations center (SOC) analysts
- Threat hunters and incident responders
- Security engineers responsible for detection engineering and telemetry
Đánh giá (4)
Giảng viên rất am hiểu và đã dành thời gian để cung cấp cái nhìn sâu sắc về các vấn đề an ninh mạng. Nhiều ví dụ này có thể được sử dụng hoặc điều chỉnh cho học viên của chúng tôi và tạo ra một số hoạt động bài học rất thú vị.
Jenna - Merthyr College
Khóa học - Fundamentals of Corporate Cyber Warfare
Dịch thuật bằng máy
Kỹ năng của người test bảo mật thể hiện qua giáo viên
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Khóa học - Ethical Hacker
Dịch thuật bằng máy
Giảng viên có phạm vi kiến thức rất rộng và cam kết với những gì ông làm. Ông có khả năng thu hút người nghe bằng khóa học của mình. Phạm vi đào tạo hoàn toàn đáp ứng kỳ vọng của tôi.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Khóa học - MasterClass Certified Ethical Hacker Program
Dịch thuật bằng máy
Tất cả đều xuất sắc
Manar Abu Talib - Dubai Electronic Security Center
Khóa học - MITRE ATT&CK
Dịch thuật bằng máy