У нас вы можете посмотреть бесплатно Threat Hunting Detection: Introduction: SOC Level 2: TryHackMe или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this SOC Level 2 Threat Hunting walkthrough, we explore the mindset, process, and goals behind effective threat hunting, using real-world examples and hands-on MITRE ATT&CK Navigator exercises. You’ll learn: ✅ The difference between threat hunting and incident response ✅ How to use threat intelligence to guide your hunts ✅ Hunting for malware, attack residues, vulnerabilities, and IOCs ✅ Practical tips for using MITRE ATT&CK Navigator to map threat actor behavior (WannaCry, Stuxnet, Conficker) ✅ How to minimize attacker dwell time and improve your detection mechanisms Chapters: (Insert the above timeline here for easy navigation) Whether you’re a SOC analyst, cybersecurity student, or threat hunter in training, this video will give you practical, actionable knowledge to strengthen your organization’s security posture. 📌 Resources Mentioned: MITRE ATT&CK Navigator MISP Threat Intelligence Platform The Zoo – Live Malware Repository Trend Micro Threat Encyclopedia #ThreatHunting #SOCAnalyst #MITREATTACK #CyberSecurity #IncidentResponse #ThreatIntel 📅 Timeline 0:01 – Introduction to SOC Level 2 Threat Hunting room 0:08 – Overview: Difficulty, duration, and learning goals 0:24 – Purpose: Understanding threat hunting vs. incident response 1:19 – Prerequisites and room start 1:43 – Core concept: Threat hunting introduction 2:25 – Comparing threat hunting with incident response (IR) 4:05 – Reactive vs. proactive approach explained 5:04 – Why organizations start threat hunting 5:56 – Synergy between threat hunting & IR 6:54 – Key definitions and quick quiz moments 9:03 – Threat intelligence in guiding hunts 10:22 – Leads and starting points for hunting 11:13 – Understanding adversaries & targeted intelligence 14:16 – Threat intelligence feeds: free vs. paid 15:22 – Examples of threat intel sources (MISP, Recorded Future, etc.) 16:28 – Threat hunting process: deciding what to hunt for 17:36 – Non-relevant malware hunting 19:39 – The Zoo: live malware repository 19:47 – Attack residues & their challenges 21:12 – Hunting for known vulnerabilities & zero-days 22:50 – Summary of hunting examples (malware, IOCs, CVEs) 23:28 – How to hunt: attack signatures, IOCs, logical queries, patterns 26:30 – Using MITRE ATT&CK for activity patterns 30:06 – Practical application: MITRE ATT&CK Navigator 31:09 – Creating layers in ATT&CK Navigator (WannaCry example) 35:32 – Adding more threat actors: Stuxnet & Conficker 39:02 – Combining multiple threat actors into one layer 45:03 – Color-coding and interpreting overlapping techniques 47:04 – Knowing when to move on in a hunt 52:29 – Identifying common techniques between threats 54:00 – Goals of threat hunting 55:52 – Minimizing dwell time of attackers 57:03 – Turning hunt findings into detection mechanisms 59:34 – Conclusion & next steps