SPECIAL OFFER: Get 50% off your first month!
Subscribe to Cybrary Insider Pro today and get 50% off your first month. Unlock full access to our learning platform and develop the skills you need to get hired.
Discount automatically applied at checkout
Training Library
Start Your Career
Certification Prep
CVE Series
Threat Actor Campaigns
Cybrary Challenges
Cybrary Live
Career Paths
OWASP Top 10
MITRE ATT&CK Training
NICE Aligned Training
Earn CEUs/CPEs
Explore Catalog
Solutions
Free Access
For Individuals
For Teams
For Government
Compare Plans
Resources
Business Resources
Webinars
Cybrary Podcasts
Guide to Retooling IT Skills for Cybersecurity Roles
Cybersecurity Career Guide
Study Guides
Blog
Help Center
Company
About
Press
Success Stories
Instructors
Careers
Cybrary Impact Hub
Pricing
Search
Popular Courses
See All
No results were found.
Popular Career Paths
See All
No results were found.
Cancel
Start learning with free on-demand video training.
Register
Login
Training Library
Start Your Career
Certification Prep
CVE Series
Threat Actor Campaigns
Cybrary Challenges
Cybrary Live
Career Paths
OWASP Top 10
MITRE ATT&CK Training
NICE Aligned Training
Earn CEUs/CPEs
Explore Catalog
Solutions
Free Access
For Individuals
For Teams
For Government
Compare Plans
Resources
Business Resources
Webinars
Cybrary Podcasts
Guide to Retooling IT Skills for Cybersecurity Roles
Cybersecurity Career Guide
Study Guides
Blog
Help Center
Company
About
Press
Success Stories
Instructors
Careers
Cybrary Impact Hub
Pricing
Popular Courses
See All
No results were found.
Popular Career Paths
See All
No results were found.
Login
Sign up
1.1 Introduction
Video Activity
Create Free Account
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an
*
Email
*
Create Free Account
or
Sign up with Google
Sign up with Apple
Sign up with Microsoft
View all SSO options
Already have an account?
Sign In »
Threat Hunting with Windows Event Forwarding
Course
Time
1 hour 21 minutes
Difficulty
Beginner
CEU/CPE
2
Create Free Account
Up Next
1.2 Native Windows Event Forwarding
4m
2.1 Group Policy for Event Collection
7m
2.2 Microsoft System Monitor (SysMon)
9m
2.3 Which Events to log for the Threat Hunt Part 1
6m
2.4 Which Events to log for the Threat Hunt Part 2
7m
View All
Instructed By
Gurvinder Singh
Information Security Manager at American Psychological Association
Instructor
Similar Content
Course
Exploitation and Mitigation: MSHTML Vulnerability (CVE-2021-40444)
5
The MSHTML Windows remote code execution vulnerability (CVE-2021-40444) identified in September 2021 could allow a ...
2CEUs
Share
Virtual Lab
Event Log Collection
3.71
In this lab you will use Splunk Enterprise to ingest logs from a local host ...
Share
Virtual Lab
Identifying Intrusion and Mitigating Attacks with RHEL Server
4.2
This last lab is similar to the Windows Incident Response lab, but different in that ...
Share