Network Based Threat Hunting

Network Based Threat Hunting

Learn to investigate threat detections to assess the scope of an attack.

rate limit

Code not recognized.

About this course

By the end of this module, you will be able to:
1) Outline methods to investigate threats using ExtraHop features
2) Identify suspicious interactions and activity in records
3) Review novel threats with ExtraHop Threat Briefings

Course Contents5 min

  • Network Based Threat Hunting

    Network Based Threat Hunting video

  • Network Based Threat Hunting Video 5 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Network Based Threat Hunting Quiz

    Network Based Threat Hunting knowledge check quiz

  • Network Based Threat Hunting Quiz
  • End of Course Survey

About this course

By the end of this module, you will be able to:
1) Outline methods to investigate threats using ExtraHop features
2) Identify suspicious interactions and activity in records
3) Review novel threats with ExtraHop Threat Briefings

Course Contents5 min

  • Network Based Threat Hunting

    Network Based Threat Hunting video

  • Network Based Threat Hunting Video 5 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Network Based Threat Hunting Quiz

    Network Based Threat Hunting knowledge check quiz

  • Network Based Threat Hunting Quiz
  • End of Course Survey