Course Outline
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- High-level EDR architecture and OpenEDR components
- Review of MITRE ATT&CK framework and threat-hunting fundamentals
OpenEDR Deployment & Telemetry Collection
- Installing and configuring OpenEDR agents on Windows endpoints
- Server components, data ingestion pipelines, and storage considerations
- Configuring telemetry sources, event normalization, and enrichment
Understanding Endpoint Telemetry & Event Modeling
- Key endpoint event types, fields, and how they map to ATT&CK techniques
- Event filtering, correlation strategies, and noise reduction techniques
- Creating reliable detection signals from low-fidelity telemetry
Mapping Detections to MITRE ATT&CK
- Translating telemetry into ATT&CK technique coverage and detection gaps
- Using ATT&CK Navigator and documenting mapping decisions
- Prioritizing techniques for hunting based on risk and telemetry availability
Threat Hunting Methodologies
- Hypothesis-driven hunting vs indicator-led investigations
- Hunt playbook development and iterative discovery workflows
- Hands-on hunting labs: identifying lateral movement, persistence, and privilege escalation patterns
Detection Engineering & Tuning
- Designing detection rules using event correlation and behavioral baselines
- Rule-testing, tuning to reduce false positives, and measuring effectiveness
- Creating signatures and analytic content for reuse across the environment
Incident Response & Root Cause Analysis with OpenEDR
- Using OpenEDR to triage alerts, investigate incidents, and timeline attacks
- Forensic artifact collection, evidence preservation, and chain-of-custody considerations
- Integrating findings into IR playbooks and remediation workflows
Automation, Orchestration & Integration
- Automating routine hunts and alert enrichment using scripts and connectors
- Integrating OpenEDR with SIEM, SOAR, and threat intelligence platforms
- Scaling telemetry, retention, and operational considerations for enterprise deployments
Advanced Use Cases & Red Team Collaboration
- Simulating adversary behavior for validation: purple-team exercises and ATT&CK-based emulation
- Case studies: real-world hunts and post-incident analyses
- Designing continuous improvement cycles for detection coverage
Capstone Lab & Presentations
- Guided capstone: full hunt from hypothesis through containment and root cause analysis using lab scenarios
- Participant presentations of findings and recommended mitigations
- Course wrap-up, materials distribution, and recommended next steps
Requirements
- An understanding of endpoint security fundamentals
- Experience with log analysis and basic Linux/Windows administration
- Familiarity with common attack techniques and incident response concepts
Audience
- Security operations center (SOC) analysts
- Threat hunters and incident responders
- Security engineers responsible for detection engineering and telemetry
회원 평가 (4)
트레이너는 매우 지식이 풍부했고 사이버 보안 문제에 대한 매우 좋은 통찰력을 제공하기 위해 시간을 들였습니다. 이러한 예 중 많은 부분을 학습자에게 사용하거나 수정하여 매우 매력적인 수업 활동을 만들 수 있습니다.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
기계 번역됨
교사가 보여주는 침투 테스터 기술
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
기계 번역됨
강사는 매우 광범위한 지식을 갖고 있으며 자신이 하는 일에 헌신적입니다. 그는 자신의 코스로 청취자의 관심을 끌 수 있습니다. 교육 범위는 내 기대에 완전히 부합했습니다.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
기계 번역됨
All is excellent