In Threat Hunting with Falcon training course, you will learn to threat hunt for indications of adversarial compromise. You will also detect when and how the compromise occurred, identify affected systems and generate key sources of threat intelligence.
By attending Threat Hunting with Falcon workshop, delegates will learn to:
- Apply industry-standard threat hunting concepts and doctrinal intelligence methodologies to their investigations
- Apply threat intelligence analysis within a threat hunt in order to discover indications of an adversarial compromise
- Develop initial threat hunting findings, create lead resolutions through the operationalization of threat intelligence and report findings
- Knowledge of Falcon Platform
- Have intermediate knowledge of cybersecurity incident investigation and the incident lifecycle
The Threat Hunting with Falcon class is ideal for:
- Current incident responders, threat hunters and intel analysts with intermediate knowledge of threat hunting principles.
