Cursusaanbod
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- High-level EDR architecture and OpenEDR components
- Review of MITRE ATT&CK framework and threat-hunting fundamentals
OpenEDR Deployment & Telemetry Collection
- Installing and configuring OpenEDR agents on Windows endpoints
- Server components, data ingestion pipelines, and storage considerations
- Configuring telemetry sources, event normalization, and enrichment
Understanding Endpoint Telemetry & Event Modeling
- Key endpoint event types, fields, and how they map to ATT&CK techniques
- Event filtering, correlation strategies, and noise reduction techniques
- Creating reliable detection signals from low-fidelity telemetry
Mapping Detections to MITRE ATT&CK
- Translating telemetry into ATT&CK technique coverage and detection gaps
- Using ATT&CK Navigator and documenting mapping decisions
- Prioritizing techniques for hunting based on risk and telemetry availability
Threat Hunting Methodologies
- Hypothesis-driven hunting vs indicator-led investigations
- Hunt playbook development and iterative discovery workflows
- Hands-on hunting labs: identifying lateral movement, persistence, and privilege escalation patterns
Detection Engineering & Tuning
- Designing detection rules using event correlation and behavioral baselines
- Rule-testing, tuning to reduce false positives, and measuring effectiveness
- Creating signatures and analytic content for reuse across the environment
Incident Response & Root Cause Analysis with OpenEDR
- Using OpenEDR to triage alerts, investigate incidents, and timeline attacks
- Forensic artifact collection, evidence preservation, and chain-of-custody considerations
- Integrating findings into IR playbooks and remediation workflows
Automation, Orchestration & Integration
- Automating routine hunts and alert enrichment using scripts and connectors
- Integrating OpenEDR with SIEM, SOAR, and threat intelligence platforms
- Scaling telemetry, retention, and operational considerations for enterprise deployments
Advanced Use Cases & Red Team Collaboration
- Simulating adversary behavior for validation: purple-team exercises and ATT&CK-based emulation
- Case studies: real-world hunts and post-incident analyses
- Designing continuous improvement cycles for detection coverage
Capstone Lab & Presentations
- Guided capstone: full hunt from hypothesis through containment and root cause analysis using lab scenarios
- Participant presentations of findings and recommended mitigations
- Course wrap-up, materials distribution, and recommended next steps
Vereisten
- An understanding of endpoint security fundamentals
- Experience with log analysis and basic Linux/Windows administration
- Familiarity with common attack techniques and incident response concepts
Audience
- Security operations center (SOC) analysts
- Threat hunters and incident responders
- Security engineers responsible for detection engineering and telemetry
Getuigenissen (4)
De trainer was zeer goed geïnformeerd en nam de tijd om een zeer goed inzicht te geven in cyberbeveiligingskwesties. Veel van deze voorbeelden kunnen worden gebruikt of aangepast voor onze leerlingen en een aantal zeer boeiende lesactiviteiten creëren.
Jenna - Merthyr College
Cursus - Fundamentals of Corporate Cyber Warfare
Automatisch vertaald
Pentestervaardigheden die de leraar demonstreren
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Cursus - Ethical Hacker
Automatisch vertaald
De instructeur heeft een zeer breed scala aan kennis en is toegewijd aan wat hij doet. Hij is in staat om de luisteraar te interesseren met zijn cursus. De omvang van de training voldeed volledig aan mijn verwachtingen.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Cursus - MasterClass Certified Ethical Hacker Program
Automatisch vertaald
Alles is uitstekend
Manar Abu Talib - Dubai Electronic Security Center
Cursus - MITRE ATT&CK
Automatisch vertaald