📖 About this Domain
This domain covers the foundational concepts of proactive threat hunting. It focuses on the methodologies and frameworks for searching for undetected adversaries, moving beyond traditional reactive security.
🎓 What You Will Learn
- Learn to apply a hypothesis-driven approach, using threat intelligence to formulate testable theories about adversary presence.
- Learn to establish and utilize baselines of network and endpoint activity to identify anomalies and deviations.
- Learn how data science techniques, such as statistical analysis and clustering, are applied to security datasets for threat discovery.
- Learn to integrate various threat intelligence sources to inform and direct hunting missions against specific TTPs.
🛠️ Skills You Will Build
- Build the ability to formulate specific, testable hunting hypotheses based on the MITRE ATT&CK framework and threat intelligence.
- Build proficiency in querying and analyzing large volumes of data from SIEM, EDR, and NDR platforms to validate hypotheses.
- Build the skill to differentiate between benign anomalies and true positive indicators of compromise (IOCs).
- Build the capability to document hunt findings and translate them into new detection rules and security controls.
💡 Top Tips to Prepare
- Memorize the core components of the threat hunting loop: hypothesis, investigation, discovery, and enrichment.
- Focus on the practical application of threat intelligence to generate high-fidelity hunting hypotheses.
- Understand the value of specific data sources, such as process execution logs and DNS queries, for detecting distinct adversary techniques.
- Practice mapping adversary TTPs from the MITRE ATT&CK framework to the data and tools required for detection.
📖 About this Domain
This domain covers proactive threat hunting methodologies using network and endpoint data sources. It emphasizes the analysis of telemetry from tools like Cisco Secure Network Analytics and Secure Endpoint. The focus is on identifying indicators of compromise (IOCs) and indicators of attack (IOAs) that evade traditional security controls.
🎓 What You Will Learn
- You will learn to differentiate threat hunting concepts from standard incident response and security monitoring.
- You will learn to utilize network data, including NetFlow, PCAP, and DNS logs, to identify malicious activity.
- You will learn to analyze endpoint data such as process execution, file hashes, and registry keys for threat detection.
- You will learn to operate both command-line interfaces (CLI) and graphical user interfaces (GUI) for threat investigations.
🛠️ Skills You Will Build
- You will build the skill to correlate disparate data sets from network and host telemetry to identify advanced threats.
- You will build proficiency in using query languages and filters within security platforms to pivot through large volumes of data.
- You will build the ability to analyze raw packet captures and flow data to reconstruct attack sequences.
- You will build competence in using command-line tools for data parsing, filtering, and analysis during a hunt.
💡 Top Tips to Prepare
- Master the interpretation of NetFlow data and its application in identifying anomalies and C2 communications.
- Gain hands-on practice with Cisco Secure Endpoint and Secure Network Analytics to understand their hunting workflows.
- Memorize key command-line utilities for data manipulation and network analysis on both Linux and Windows systems.
- Understand the core principles of threat hunting models like the Diamond Model to structure your analysis process.
📖 About this Domain
This domain covers proactive threat hunting techniques focused on endpoint security telemetry and host-based artifacts. You will analyze endpoint data using tools like Cisco Secure Endpoint to uncover covert threats that evade traditional security controls.
🎓 What You Will Learn
- Learn to interpret process trees, file hashes, and network connections from endpoint telemetry.
- You will learn to identify Indicators of Compromise (IOCs) and Indicators of Attack (IOAs) within host event logs and process activity.
- Understand structured hunting models like hypothesis-driven hunting to search for specific TTPs on endpoints.
- Gain proficiency in using Endpoint Detection and Response (EDR) platforms for advanced queries and investigations.
🛠️ Skills You Will Build
- You will build the skill to construct complex queries in an EDR console to hunt for anomalous endpoint behavior.
- Develop the ability to analyze file artifacts, registry modifications, and persistence mechanisms on compromised hosts.
- You will build the skill to correlate endpoint process activity with network traffic data for a comprehensive investigation.
- Learn to formulate testable hypotheses based on threat intelligence to guide your endpoint threat hunting campaigns.
💡 Top Tips to Prepare
- Focus on hands-on practice with the Cisco Secure Endpoint console, especially its advanced search and device trajectory features.
- Correlate endpoint artifacts and behaviors with specific MITRE ATT&CK tactics and techniques (TTPs).
- Use case studies or lab environments to practice hunting for specific malware families or attack patterns on endpoints.
- Familiarize yourself with critical artifacts from Windows, Linux, and macOS systems, such as event logs and registry keys.
📖 About this Domain
This domain covers the evaluation of existing security architectures to identify weaknesses. It focuses on analyzing security designs, technologies, and policies to find vulnerabilities and gaps. The primary objective is recommending specific mitigations to strengthen the security posture.
🎓 What You Will Learn
- You will learn to identify specific vulnerabilities present in a given security design.
- You will learn to recognize security technology and control gaps within an existing architecture.
- You will learn to analyze security policies and procedures to find deficiencies that create risk.
- You will learn to recommend specific changes to designs, technologies, and policies to mitigate identified gaps.
🛠️ Skills You Will Build
- You will build the skill to perform a critical review of a security architecture to find inherent flaws.
- You will build the ability to assess security policies and procedures for gaps and ineffectiveness.
- You will build the skill to recommend specific mitigation strategies and compensating controls.
- You will build the ability to map identified vulnerabilities to actionable remediation plans.
💡 Top Tips to Prepare
- Master secure design principles like defense-in-depth and segmentation to effectively identify architectural weaknesses.
- Practice analyzing sample network diagrams and security policies to simulate identifying gaps and vulnerabilities.
- Understand the specific roles of security technologies like NGFW, WAF, and SIEM to recommend appropriate solutions.
- Familiarize yourself with common vulnerability frameworks to quickly spot potential issues in a given design.
📖 About this Domain
This domain covers the automation of threat hunting workflows using scripting and orchestration. It emphasizes leveraging APIs to integrate security tools for scalable, automated detection and response.
🎓 What You Will Learn
- Utilize Cisco security product APIs, such as SecureX and Secure Endpoint, for programmatic data retrieval and enforcement actions.
- Develop Python scripts to automate the parsing and enrichment of security telemetry from sources like NetFlow and Syslog.
- Construct SOAR playbooks within platforms like Cisco SecureX orchestration to automate complex threat hunting sequences.
- Implement automated workflows that trigger based on IOCs or anomalous activity for continuous threat monitoring.
🛠️ Skills You Will Build
- Proficiency in consuming REST APIs from Cisco security platforms to automate data collection and response tasks.
- Ability to write functional Python scripts for security automation, including handling JSON data structures and API interactions.
- Competency in designing and implementing automated response playbooks using Cisco SecureX orchestration.
- Skill in normalizing and correlating disparate security data sets for effective automated analysis and threat detection.
💡 Top Tips to Prepare
- Gain hands-on experience with the Cisco SecureX, Secure Endpoint, and Secure Firewall APIs through Cisco DevNet sandboxes.
- Practice scripting with Python, focusing on libraries like 'requests' for API calls and 'json' for data handling.
- Build and test basic playbooks in a Cisco SecureX orchestration lab environment to understand workflow logic.
- Study common data formats like STIX/TAXII and understand how they facilitate threat intelligence sharing in automated systems.
📖 About this Domain
This domain covers proactive threat hunting methodologies within modern application and cloud environments. It emphasizes the analysis of logs and artifacts from web applications, databases, and cloud infrastructure. The objective is to identify malicious activities that evade conventional security measures.
🎓 What You Will Learn
- You will learn to analyze application artifacts, such as executables and scripts, to identify indicators of compromise (IOCs).
- You will learn to parse web application logs to detect common attacks like SQL injection and cross-site scripting (XSS).
- You will learn to examine database logs for unauthorized access, data exfiltration, and privilege escalation attempts.
- You will learn to investigate cloud infrastructure and application logs from services like AWS CloudTrail or Azure Monitor for anomalous behavior.
🛠️ Skills You Will Build
- You will build the skill to perform deep-dive analysis of diverse log sources from on-premise and cloud-native applications.
- You will build the ability to correlate events across application, database, and cloud infrastructure layers to construct an attack timeline.
- You will build proficiency in identifying misconfigurations and vulnerabilities within cloud environments like AWS, Azure, or GCP.
- You will build the capability to hunt for threats specific to serverless architectures and containerized environments.
💡 Top Tips to Prepare
- Master common log formats for web servers like Apache/NGINX and understand database transaction logs.
- Practice using query languages like SQL or specific cloud-native tools to filter and search large log datasets for anomalies.
- Gain hands-on experience with major Cloud Service Provider (CSP) logging services such as AWS CloudTrail, CloudWatch, and Azure Monitor.
- Map observed activities in application and cloud logs to specific tactics and techniques in the MITRE ATT&CK framework.
Premium Access Includes
- ✓ Quiz Simulator
- ✓ Exam Mode
- ✓ Progress Tracking
- ✓ Question Saving
- ✓ Flash Cards
- ✓ Drag & Drops
- ✓ 3 Months Access
- ✓ PDF Downloads