Building a Threat Hunting Capability
Turn your defense into offense with Building a Threat Hunting Capability, a course designed to explore the options available to organizations for cyber threat hunting, including manual, automated, and machine-assisted hunters. You will learn to identify and evaluate strategies for cyber-attack prevention and improve your preparedness for cyber threats. Lead the transformation of your company's team structures and learn new advanced security processes from a certified expert.
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“There are really three crucial areas in building a threat hunting capability: The first is knowing your environment, the second is building a good hypothesis. But the third piece, which probably is more crucial than anything else, is the after action.”
This focused cybersecurity course is ideal for managers who want to develop the knowledge necessary to adeptly assess and utilize complex threat intelligence. Sharpen your decision-making ability by developing an understanding of the forms that contemporary threat intelligence can take and explore real-world examples of threat intelligence in action.
Module 1: What Is Threat Hunting and Where Does It Fit In?
Define the activities, goals and objectives of your threat hunting capability. Identify assumptions and knowledge of your network in order to determine valid targets to hunt for. Explain key steps involved in building a threat hunting function inside your current program. Describe key ingredients for maximizing your team's threat hunting outcomes.
Module 2: Building Hypotheses and Hunt Targets
Describe key components of the hunt process including the role of the hypothesis in the process. Define the elements of a good hunt hypothesis. Evaluate the quality of various hunt hypotheses. Create a hunt hypothesis. Explain how available tools can become the limiting factor in developing good hypotheses. Describe the role and functionality of MitreAtt&ck in the hunt process.
Module 3: Hunting Maturity Model
Describe the role of the maturity model as applies to threat hunting activities. Explain key components of the hunting maturity model. Describe the relationship between the pyramid of pain and hunting maturity. Explain key steps involved in progressing your team to perform different and higher quality hunting activities.
Module 4: Packaging and Maintaining Threat Intelligence
Describe how to use metrics to measure your team's effectiveness and trends over time. Apply metrics to measure threat hunting effectiveness. Justify the investment in time and money and its value to leadership using metrics. Evaluate sample metrics.
Healthcare Informatics Foundations and Frameworks
Now, more than ever, the healthcare industry needs professionals who can use emerging technology to optimize healthcare delivery and improve outcomes. Healthcare Informatics...
Healthcare Analytics Foundations and Frameworks
What does it look like when data is used for good? In this new era of healthcare, we’re all relying on...
Machine Learning Cases
This is your chance to learn from the successes and failures of others to build your machine learning skillset. Rooted in real cases, this course...
Building a Red Team Capability
Can a friendly company hacker exist? A growing number of companies see the advantage not only in simulated attacks but in indirectly testing...
Want to emulate the success of blockchain games like CryptoKitties and avoid the failures of initiatives like the DAO? Blockchain Cases teaches you...
Blockchain and Industry
You have a brilliant idea for how blockchain can benefit your company, but how do you put it into practice? Blockchain and Industry...
Machine Learning and Industry
Even if you have an idea for a machine learning solution that could transform your company, implementing it is a whole different challenge. Machine Learning...
Cyber Threat Intelligence
Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains...
Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud...
What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches...
Cybersecurity Risks and Industry
You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? Cybersecurity Risks...
Machine Learning Foundations and Frameworks
The big data revolution is underway. Are you ready to embrace the machine learning innovations that can lead your company to the top? Machine Learning...
Cybersecurity Foundations and Frameworks
In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks teaches you...
Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security...
Blockchain Foundations and Frameworks
By now, you’ve heard about blockchain. But do you know exactly what it is, or how it can take your business to the...
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.