- Over ons
Hands-on Technical Online Training | 20 & 21 May | 8:30 – 5:00
Format: Online interactive instructor-led training
Price: Neem contact op met Services via email@example.com of bel naar +31(0)499 – 462121.
“Enterprises are facing more and more breaches and it’s clear that a pure prevention based approach is simply not enough. In this two day training, we will teach students how to add early detection and response capabilities to their current “defence in depth” security infrastructure. Not only will students learn what to look for in their environment, but we will also go in-depth into TTP’s (Mitre) and do a deep dive into how these common attack techniques work, to build accurate detections.”
In-Depth Course Introduction (webinar 50 minutes)
The course is aimed at individuals that want to gain a better understanding in how to design, build, and operate their hunting platform to quickly identify threats. The course is accessible to persons that are part of a SOC, Incident Response or Threat Hunting team, but also to General security practitioners, system administrators and security architects. Companies looking to build their own SOC, or that are looking to make vendor choices for SIEM/EDR solutions will get a clear understanding of how these technologies work, what they can and cannot do, and how they work together.
You Will Learn:
After following this training, students will
Familiarity with Linux and Windows is mandatory.
Baseline Hardware Requirements:
Students need to bring their own laptops with the following minimum system requirements: