Threat hunting with Python
Network breaches are growing in frequency and severity. Network defenders are trying to keep up but are outpaced by the ever-changing technical advancements of adversary capabilities and ingenuity. Defenders need the tools and skills to keep pace to discover and eradicate these evolving threats, but sometimes the tool doesn’t exist or is not available to the defending team. Hackers don’t wait, and neither should we. Learn to develop and apply custom scripts and data analysis techniques to uncover and neutralize persistent threats with Python.
In this course, we will assume the role of a cyber analyst in an enterprise network and take a hands-on approach to conducting threat hunting with Python to discover persistent network threats. Using relevant data sources, we will acquire, filter, and enrich log data to identify key indicators of compromise and the scope of the network breach.
$3,000.00 per person
Over the duration of the course, students will conduct hands-on labs with Python to identify and scope the extent of a targeted network breach. Students will parse files, conduct data analysis and create visualizations, use APIs, and complete a multitude of analytical challenges during the course and in a capstone challenge.
You will Recieve
Certificate of completion, USB flash drive with course materials, and related text books.
Contact Us for group and Geekdom member pricing.
Students will need to provide their own laptop
Any OS is supported
We utilize a private development environment so there is nothing to install or configure on your machine.