Skip to main content

Home Specialist skills Security FOR577: LINUX Incident Response and Threat Hunting

FOR577: LINUX Incident Response and Threat Hunting

  • bullet point
    Use the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to remediate incidents.
  • bullet point
    Determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms.
  • bullet point
    Identify lateral movement and pivots within your enterprise, showing how attackers transition from system to system without detection.
  • bullet point
    Recover and analyze archives and archive files (.rar, .tar, etc.) used by APT-like attackers to exfiltrate sensitive data from the enterprise network.
  • bullet point
    Use collected data to perform effective remediation across the entire enterprise.

Overview

Off the shelf (OTS)

FOR577 teaches the skills needed to identify, analyze, and respond to attacks on Linux platforms and how to use threat hunting techniques to find the stealthy attackers who can bypass existing controls. The course addresses today's incidents by teaching the hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to combat real-world breach cases. 

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Digital icon

Digital

Course duration
Duration icon

42 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

  • Digital icon

    Digital

Course duration
Duration icon

42 hours

Competency level
  • Working icon

    Working

chatbotSpark login – Alpha testing