Threat Investigation

This course is part of Cybersecurity Operations Fundamentals Specialization

Instructor: Cisco Learning & Certifications

Skills you'll gain

  •   Incident Response
  •   Vulnerability Assessments
  •   Threat Management
  •   Network Analysis
  •   Security Management
  •   Cyber Threat Hunting
  •   Network Security
  •   Continuous Monitoring
  •   Event Monitoring
  •   Cyber Threat Intelligence
  •   Threat Detection
  •   Security Information and Event Management (SIEM)
  • There are 4 modules in this course

    If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand how threat-centric SOC must prepare for analyzing new and emerging threats by implementing robust security investigation procedures • By the end of the course, you will be able to: • Understand cyber-threat hunting concepts • Describe the five hunting maturity levels (HM0–HM4) • Describe the hunting cycle four-stage loop• Describe the use of the Common Vulnerability Scoring System (CVSS) and list the CVSS v3.0 base metrics• Describe the CVSS v3.0 scoring components (base, temporal, and environmental) • Provide an example of CVSS v3.0 scoring • Describe the use of a hot threat dashboard within a SOC • Provide examples of publicly available threat awareness resources • Provide examples of publicly available external threat intelligence sources and feeds• Describe the use of security intelligence feed • Describe threat analytics systems • Describe online security research tools • Simulate malicious actions to populate the event data on the Security Onion tools for later analysis • Identify resources for hunting cyber threats. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

    Understanding Event Correlation and Normalization

    Conducting Security Incident Investigations

    Using a Playbook Model to Organize Security Monitoring

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved