Course Outline
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- High-level EDR architecture and OpenEDR components
- Review of MITRE ATT&CK framework and threat-hunting fundamentals
OpenEDR Deployment & Telemetry Collection
- Installing and configuring OpenEDR agents on Windows endpoints
- Server components, data ingestion pipelines, and storage considerations
- Configuring telemetry sources, event normalization, and enrichment
Understanding Endpoint Telemetry & Event Modeling
- Key endpoint event types, fields, and how they map to ATT&CK techniques
- Event filtering, correlation strategies, and noise reduction techniques
- Creating reliable detection signals from low-fidelity telemetry
Mapping Detections to MITRE ATT&CK
- Translating telemetry into ATT&CK technique coverage and detection gaps
- Using ATT&CK Navigator and documenting mapping decisions
- Prioritizing techniques for hunting based on risk and telemetry availability
Threat Hunting Methodologies
- Hypothesis-driven hunting vs indicator-led investigations
- Hunt playbook development and iterative discovery workflows
- Hands-on hunting labs: identifying lateral movement, persistence, and privilege escalation patterns
Detection Engineering & Tuning
- Designing detection rules using event correlation and behavioral baselines
- Rule-testing, tuning to reduce false positives, and measuring effectiveness
- Creating signatures and analytic content for reuse across the environment
Incident Response & Root Cause Analysis with OpenEDR
- Using OpenEDR to triage alerts, investigate incidents, and timeline attacks
- Forensic artifact collection, evidence preservation, and chain-of-custody considerations
- Integrating findings into IR playbooks and remediation workflows
Automation, Orchestration & Integration
- Automating routine hunts and alert enrichment using scripts and connectors
- Integrating OpenEDR with SIEM, SOAR, and threat intelligence platforms
- Scaling telemetry, retention, and operational considerations for enterprise deployments
Advanced Use Cases & Red Team Collaboration
- Simulating adversary behavior for validation: purple-team exercises and ATT&CK-based emulation
- Case studies: real-world hunts and post-incident analyses
- Designing continuous improvement cycles for detection coverage
Capstone Lab & Presentations
- Guided capstone: full hunt from hypothesis through containment and root cause analysis using lab scenarios
- Participant presentations of findings and recommended mitigations
- Course wrap-up, materials distribution, and recommended next steps
Requirements
- An understanding of endpoint security fundamentals
- Experience with log analysis and basic Linux/Windows administration
- Familiarity with common attack techniques and incident response concepts
Audience
- Security operations center (SOC) analysts
- Threat hunters and incident responders
- Security engineers responsible for detection engineering and telemetry
Σχόλια (4)
Ο εκπαιδευτής ήταν πολύ γνώστης και αφιέρωσε χρόνο για να δώσει μια πολύ καλή εικόνα για θέματα ασφάλειας στον κυβερνοχώρο. Πολλά από αυτά τα παραδείγματα θα μπορούσαν να χρησιμοποιηθούν ή να τροποποιηθούν για τους μαθητές μας και να δημιουργήσουν μερικές πολύ ενδιαφέρουσες δραστηριότητες μαθήματος.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Μηχανική Μετάφραση
Οι δεξιότητες των Πεντεστέρων είναι αυτό που καταδεικνύουν ο δάσκαλος
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
Μηχανική Μετάφραση
Ο εκπαιδευτής έχει πολύ ευρύ φάσμα γνώσεων και είναι αφοσιωμένος σε αυτό που κάνει. Είναι σε θέση να ενδιαφέρει τον ακροατή με την πορεία του. Το εύρος της εκπαίδευσης ανταποκρίθηκε πλήρως στις προσδοκίες μου.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
Μηχανική Μετάφραση
Όλο είναι άριστο
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Μηχανική Μετάφραση