The focus will be on processes and techniques that can be used to protect:
Desktops
Servers
Network Gear
IIoT
BYOD Systems
The course also includes hands-on labs using packet captures of various command and control channels. The labs will enable you to apply what they have learned using various open-source tools. By the end of the course you’ll understand the tools and techniques needed to perform compromise assessments within your own environment. While the course will be available later for download, live attendees will receive a “Cyber Security Threat Hunter Level-1” certificate.