CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting

CEH v12    |    Intermediate
  • 4 videos | 1h 17m 12s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
If you know how most threat actors and groups attack their targets, you'll be better equipped to defend against those attacks. In this course, you'll explore the seven phases of the Cyber Kill Chain, which aims to guide defenders in their understanding of commonly used attack strategies. Next, you'll learn how tactics, techniques, and procedures can help you better understand the threats your organization faces. You'll move on to examine behavioral patterns typical with today's threat actors and advanced persistent threats. The average time it takes to detect a breach is around 200 days, which is why threat hunting has become a standard security practice. To complete this course, you'll explore threat hunting and its usefulness, as well as the concept of indicators of compromise (IoC). This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify the functionality of the cyber kill chain
    recognize the seven phases of the cyber kill chain
    define the actions of a hacker in terms of the phases of the cyber kill chain
    Recognize how procedures are used to better understand threat actors
    identify how threats relate to the tactics, techniques, and procedures (ttps)
    Recognize behavioral patterns of threat actors
  • identify threat actor behavioral patterns that are not normal on the network
    recognize threat actor behavioral patterns that are outside normal user activity
    identify the behavioral pattern used by threat actors to exfiltrate data or lock access to data
    Describe threat hunting and how a threat hunter investigates a system
    identify the types of indicators of compromise (ioc) related to threat hunting activities
    distinguish the indicators of compromise (ioc) category related to threat hunting activities

IN THIS COURSE

  • Locked
    1.  Cyber Kill Chain
    17m 2s
    Upon completion of this video, you will be able to recognize the seven phases of the Cyber Kill Chain, which aims to guide defenders in their understanding of commonly used attack strategies. FREE ACCESS
  • Locked
    2.  Tactics, Techniques, and Procedures
    7m 58s
    After completing this video, you will be able to recognize how tactics, techniques, and procedures (TTPs) can help you better understand the threats your organization faces. FREE ACCESS
  • Locked
    3.  Common Adversarial Behaviors
    26m 43s
    Upon completion of this video, you will be able to recognize behavioral patterns typical with today's threat actors and advanced persistent threats (APTs). FREE ACCESS
  • Locked
    4.  Threat Hunting Concepts
    25m 29s
    After completing this video, you will be able to outline threat hunting and its usefulness, as well as the concept of indicators of compromise (IoC) in relation to threat hunting activities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.7 of 42 users Rating 4.7 of 42 users (42)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)