Home Specialist skills Security FOR577: LINUX Incident Response and Threat Hunting
FOR577: LINUX Incident Response and Threat Hunting
-
Use the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to remediate incidents.
-
Determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms.
-
Identify lateral movement and pivots within your enterprise, showing how attackers transition from system to system without detection.
-
Recover and analyze archives and archive files (.rar, .tar, etc.) used by APT-like attackers to exfiltrate sensitive data from the enterprise network.
-
Use collected data to perform effective remediation across the entire enterprise.
Overview
Off the shelf (OTS)
FOR577 teaches the skills needed to identify, analyze, and respond to attacks on Linux platforms and how to use threat hunting techniques to find the stealthy attackers who can bypass existing controls. The course addresses today's incidents by teaching the hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to combat real-world breach cases.Â
Delivery method
Face to face
Virtual
Digital
Course duration
42 hours
Competency level
Working

Delivery method
-
Face to face
-
Virtual
-
Digital
Course duration
42 hours
Competency level
-
Working
