CYBF 671 Cyber Hunting
Examines all types of asymmetric threat agents, their tactics, techniques and artifacts that may present during the first phases of a compromise before an intrusion occurs. Topics include models and phases of intrusion, including models of reconnaissance, identification of key sources of threat intelligence including sourcing and deployment of open source tool commonly used in network intrusions and malicious attack activities, network architecture, detection of pre-attack indicators and malicious intrusions.
Prerequisite
None