Security Threat Management (Active, Predictive and Proactive Approaches)
About This Course
Participants will be able to relate activities and the goals of threat detection, threat defence and threat intelligence, threat modelling and threat monitoring to respective aspects of security threat management; understand how cyber threat hunting, as the proactive approach in threat management is conducted; understand how to analyse security logs and identify patterns that may be threats-related; understand the role of SIEM in threat management; and be aware of the concept of the cyber kill chain and attack framework and its application in the real world; be able to draw reference from the network protocols and topology information in threat analysis study; and understand how to install and run a security application.
What You'll Learn
2. Cyber Threat Hunting as the proactive approach– purpose and scope of coverage
3. Log management – to identify anomalous activity, intrusions and threats
4. Analysis of security event logs, system logs, security control logs, network packets
5. Adopting SIEM in Threat management
6. The concept of the cyber kill chain and Attack framework and its application in the real world
7. The relevance of Network protocols and topology in threat analysis study
8. Security application installation process
Entry Requirements
Basic IT knowledge & fundamentals of cybersecurity