This live and interactive training is designed to help you understand your network environment, monitor it for threats, perform incident response against identified threats, and learn different adversary tactic, techniques, and procedures (TTPs). You will gain hands-on experience of the process of monitoring, responding to, and remediating internal threats (also known as active defense). You will learn how to use tools such as Security Onion and RedHunt OS to perform digital forensics and incident response (DFIR), as well as Threat Hunting.
In this live training you will complete different a hands-on real-world incident response and learn concepts such as using threat intelligence, security monitoring, and utilizing threat analysis and incident response methodologies. You will learn about tools such as Snort, Suricata, Zeek (formerly known as Bro), Sguil, Squert, Elasticsearch, logstash, and Kibana (ELK), Caldera, Atomic Red Team, Metasploit, Maltego, Datasploit, Yeti, Harpoon, and many others.