CEH v11: Cyber Kill Chain TTPs Behaviors & Threat Hunting
If you know how most threat actors and groups attack their targets you;ll be better equipped to defend against those attacks. In this course you;ll explore the seven phases of the Cyber Kill Chain which aims to guide defenders in their understanding of commonly used attack strategies. Next you;ll learn how tactics techniques and procedures can help you better understand the threats your organization faces. You;ll move on to examine behavioral patterns typical with today threat actors and Advanced Persistent Threats. The average time it takes to detect a breach is around 200 days which is why threat hunting has become a standard security practice. To complete this course you;ll explore threat hunting and its usefulness as well as the concept of Indicators of compromise. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.