CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
Ethical Hacker v11
| Intermediate
- 4 videos | 1h 5m 34s
- Includes Assessment
- Earns a Badge
If you know how most threat actors and groups attack their targets, you'll be better equipped to defend against those attacks. In this course, you'll explore the seven phases of the Cyber Kill Chain, which aims to guide defenders in their understanding of commonly used attack strategies. Next, you'll learn how tactics, techniques, and procedures can help you better understand the threats your organization faces. You'll move on to examine behavioral patterns typical with today's threat actors and Advanced Persistent Threats. The average time it takes to detect a breach is around 200 days, which is why threat hunting has become a standard security practice. To complete this course, you'll explore threat hunting and its usefulness, as well as the concept of Indicators of compromise. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Define the actions of a hacker in terms of the phases of the cyber kill chainidentify the functionality of the cyber kill chainrecognize the seven phases of the cyber kill chainIdentify how threats relate to the tactics, techniques, and procedures (ttps)recognize how procedures are used to better understand threat actorsIdentify threat actor behavioral patterns that are not normal on the network
-
identify the behavioral pattern used by threat actors to exfiltrate data or lock access to datarecognize threat actor behavioral patterns that are outside normal user activityrecognize behavioral patterns of threat actorsIdentify the types of indicators of compromise (ioc) related to threat hunting activitiesdescribe threat hunting and how a threat hunter investigates a systemdistinguish the indicators of compromise (ioc) category related to threat hunting activities
IN THIS COURSE
-
16m 3sUpon completion of this video, you will be able to recognize the seven phases of the Cyber Kill Chain. FREE ACCESS
-
9m 58sIn this video, you will identify how threats relate to the Tactics, Techniques, and Procedures (TTPs). FREE ACCESS
-
22m 1sAfter completing this video, you will be able to recognize the behavioral patterns of threat actors. FREE ACCESS
-
17m 34sUpon completion of this video, you will be able to describe threat hunting and how a threat hunter investigates a system. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.