Free
MITRE ATT&CK Defender™ ATT&CK® Threat Hunting
Do you want to learn the MITRE ATT&CK methodology for Threat Hunting? In this MITRE ATT&CK® Defender™ (MAD) Threat Hunting course, you’ll learn how to leverage the MITRE ATT&CK framework to develop hypotheses and analytics that enable you to hunt real-world threats and improve your cybersecurity.

4
H
42
M
Time
intermediate
difficulty
5
ceu/cpe
Course Content
Validating Configuration
Identifying and Mitigating Data Collection Gaps
Communicating with Network Managers
Identifying and Mitigating Data Collection Gaps
Using Alternative Data Sources and Analytics
Identifying and Mitigating Data Collection Gaps
Developing a Sensor Strategy
Identifying and Mitigating Data Collection Gaps
Time, Terrain, and Behavior Considerations
Identifying and Mitigating Data Collection Gaps
Identifying Gaps
Identifying and Mitigating Data Collection Gaps
Module 3 Knowledge Check
Determining Data Requirements
Leveraging External Resources for Data Requirements
Determining Data Requirements
Diving into Data Sources
Determining Data Requirements
Balancing Data Requirements
Determining Data Requirements
Module 2 Knowledge Check
Developing Hypotheses and Abstract Analytics
Leveraging External Resources for Analytics
Developing Hypotheses and Abstract Analytics
Creating Abstract Analytics
Developing Hypotheses and Abstract Analytics
Refining Hypotheses
Developing Hypotheses and Abstract Analytics
Investigating Low-Variance Behaviors
Developing Hypotheses and Abstract Analytics
Researching Low-Variance Behaviors
Developing Hypotheses and Abstract Analytics
Finding Low-Variance Behaviors
Developing Hypotheses and Abstract Analytics
Hypotheses Considerations
Developing Hypotheses and Abstract Analytics
Developing Hypotheses
Developing Hypotheses and Abstract Analytics
Module 1 Knowledge Check
Threat Hunting Fundamentals
Methodology Overview
Threat Hunting Fundamentals
Prioritization
Threat Hunting Fundamentals
TTP-Based Detection
Threat Hunting Fundamentals
Detection Approaches
Threat Hunting Fundamentals
Threat Hunting Fundamentals Course Introduction
Threat Hunting Fundamentals
Course Description