CEH v12: Cyber Kill Chain TTPs Behaviors and Threat Hunting
If you know how most threat actors and groups attack their targets you;ll be better equipped to defend against those attacks.
In this course you;ll explore the seven phases of the Cyber Kill Chain which aims to guide defenders in their understanding of commonly used attack strategies. Next you;ll learn how tactics techniques and procedures can help you better understand the threats your organization faces. You;ll move on to examine behavioral patterns typical with today threat actors and advanced persistent threats. The average time it takes to detect a breach is around 200 days which is why threat hunting has become a standard security practice. To complete this course you;ll explore threat hunting and its usefulness as well as the concept of indicators of compromise (IoC).
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.