Training – Cyber Threat Hunting w/ Chris Brenton
GoToWebinarYou asked... we listened! Our Threat Hunt Training will now be a 6-hour course! Chris Brenton is conducting a free, one-day, Cyber Threat […]
You asked... we listened! Our Threat Hunt Training will now be a 6-hour course! Chris Brenton is conducting a free, one-day, Cyber Threat […]
The Internet Control Message Protocol (ICMP) is the maintenance protocol of the internet. It is primarily used for error reporting and determining connectivity […]
You asked... we listened! Our Threat Hunt Training will now be a 6-hour course! Chris Brenton is conducting a free, one-day, Cyber Threat […]
Let’s put your sensors to work! Learn to take your sensor from a lab environment and deploy your sensor in production. Learn from […]
You asked… we listened! Our Threat Hunt Training will now be a 6-hour course! Chris Brenton is conducting a free, one-day, Cyber Threat […]
One of the cool things about cyber threat hunting is that the discipline has been around for less than five years. This means […]
What do you do when you're caught between a loaded high-speed network cable and a packet analysis tool that just can't keep up? […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far...We have had almost 20,000 students […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far…We have had over 20,000 students […]
Our "Malware of the Day" blog series has become a huge hit over the last year and a half! The goal of the […]
R.I.T.A. (Real Intelligence Threat Analytics) is an open-source framework for detecting command and control communication through network traffic analysis. But how exactly does […]
So you've studied threat hunting methodology and researched all the threat hunting tools... but how do you actually apply all this knowledge into […]