Course Overview
We are at war with the adversary. In the modern enterprise, the threat landscape is growing faster than ever. From advanced persistent threats and nation states, to ransomware-as-a-service groups, many of today’s adversaries are well-funded, fast-moving, and constantly evolving. They want to get inside of our networks to expand their influence and cause harm. At the same time, the modern enterprise is more complex and distributed than ever, with hybrid environments, cloud services, the rise of remote workforces, and hundreds, if not thousands of endpoints, all creating new challenges for us as defenders.
But fortunately, not all hope is lost. Defenders are evolving too. While attacker techniques continue to grow, they’re not infinite. At the end of the day, we’re not at war against systems or specific tools. Attackers are human, and humans have behaviors. And those behaviors create patterns. Inevitably, intrusions leave traces behind. The modern enterprise is scaling rapidly, with more complexity and attack surface than ever before. But that doesn’t mean that defenders have to be left behind. We have the power to respond at scale, to hunt at scale, and to use the very complexity of today’s networks to our advantage. .
With the right skills, mindset, and methodology, we have the opportunity to get ahead of the adversary: to anticipate, detect, and disrupt their operations before real damage is done. .
This class is designed to give you a solid, practical foundation in threat hunting, incident response, and digital forensics: three pillars of modern security operations. .
You’ll learn how to think like an attacker and investigate like a responder. You’ll go beyond the surface of alerts and dashboards, and understand how intrusions unfold, how to uncover them at scale, and how to stop them in their tracks. .
By the end of this class, you’ll be able to:
- Use a strong, methodical investigator’s mindset to approach complex incidents with confidence
- Use industry-standard tools and methodologies for detecting, hunting, and responding to threats across modern enterprise environments
- Investigate advanced adversary tactics that map to MITRE ATT&CK
- Identify the root cause of an intrusion to scope the full extent of a compromise
- And much more.