RecertHero
Back to browse
Webinar·SANS InstituteOfficial

Building Maturing Threat Hunt Program

Building and Maturing Your Threat Hunt Program While threat hunting sounds exciting--and promising--building an effective program can be daunting. The very definition of threat hunting is fluid, creating confusion about how to use it. Practitioners often have varying opinions about what would be involved in a threat hunt program and how to use it. And, there are many questions about how to develop a program that can evolve into an effective, mature one.In this new SANS webcast, SANS instructor Davis Szili, with insights from a Cisco representative, will help attendees define threat hunting and create an effective process for using it.'the webcast will address getting started, including building a team, what a typical hunt might look like and building a knowledge base for later use. 'Attendees also will learn how to create a test lab and use effective metrics.Register now and be among the first to receive the associated white paper written by David Szili.WebinarDigital Forensics and Incident Response Presented: 25 Jun 2019 Technical Presentation View details

Self-pacedFree

Likely qualifies for

Estimated credit values based on the content of this opportunity. Always verify with your certifying body before claiming.

CompTIAHigh confidence
CySA++1 credits

Threat hunting directly aligns with CySA+ core competencies in threat detection, analysis, and the incident response lifecycle.

ISACAMedium confidence
CISM+0.75 credits

Program development, team building, and metrics/governance aspects of threat hunting map to CISM's information security program management objectives.

Credit estimates are RecertHero's best-effort interpretation of the content described. Each certifying body has its own rules — always confirm with the official CPE / CEU policy and keep your own attendance records.