Cybersecurity Threat Hunting for SOC Analysts
- Description
- Curriculum
- FAQ
- Reviews
Zeek + Suricata.
Splunk.
Sysmon.
Microsoft Advanced Threat Analytics.
TCPdump + ngrep
Wireshark + tshark.
Wait, I’m not done.
capinfos.
RITA.
Bloodhound.
Bad Blood.
Detection Lab.
Metasploit + msfvenom + Meterpreter + Process Injection.
Mimikatz.
OS Query.
Velociraptor + Memory Forensics.
Taking a breath… one sec… okay..
Fleet.
MITRE ATT&CK.
MITRE Caldera.
Prelude Operator.
Atomic Red Team.
Purple Sharp.
Boss of the SOC???
Yup.
This is one course. One source. One resource that has the potential to change your professional life.
Check out the free content and level up your cyber skills by learning how to become a threat hunter…
Everything is step by step.
You will learn how to detect advanced threat actors on enterprise networks…
How will you learn this?
By building a modern lab replete with a Domain Controller, Windows 10 endpoint instrumented with Powershell logging, Sysmon, OS Query, Velociraptor and more.
You will attack and detect threats like a pro.
This was the dream course I wish I had when I was getting into cyber.
Everything is carefully, patiently and thoughtfully explained.
It took me two months to build this course and I’ve poured my heart and soul into every lecture.
If you’re trying to get into cybersecurity from another career or you’re curious how the bad guys breach and persist in networks then this course is for you. I’ve not held anything back. Everything you need to become a competent threat hunter is included in over 8 hours of content.
Are you ready?
I am! sign-up now and let’s get started!
-
1Download VMWare Workstation ProVideo lesson
Yes! The first step to building our cyber threat hunting lab is to download our Type 2 hypervisor. There are several out there, Hyper-V, VirutalBox and VMWare Workstation are the big one but one reigns supreme! In this lecture I'll show you how to quickly grab your VMWare Workstation Pro trial so we can prep for installation.
-
2Install VMWare Workstation ProVideo lesson
Now it's time to install our Type 2 hypervisor. In this lecture we'll install VMWare Workstation Pro and I'll explain a few key settings along the way. We'll be done in a flash. Let's go!
-
3Download Kali Linux VMVideo lesson
Our chief operating VM will be Kali Linux! In this lightning lecture we'll grab the VMWare version (not the ISO) and prepare for extraction.
-
4Install Kali Linux VMVideo lesson
Yes! It's time to extract and import baby! We'll talk about some of the files in the VM, a few key settings to establish and then we'll unzip this thing and add to VMWare Workstation Pro!
-
5Configure Kali Linux VM: pimpmykali.shVideo lesson
Now we must pimp our VM. MUST means it ain't optional! Let's go!
-
6Configure Kali Linux VM: TMUXVideo lesson
The TMUX way will become your favorite way to navigate the Linux terminal. In this lecture, you'll learn how to configure this awesome emulator.
-
7Configure Kali Linux VM: Odds and EndsVideo lesson
Sweet, now we're going to modify the power settings, tweak the desktop a little and then the best part: I'll teach you how to use TMUX to split panes, resize panes, rename panes, copy and paste from panes, log all your commands and more! It's going to be a lot of fun so let's go!
-
8Active Countermeasures: Malware of the DayVideo lesson
Malware of the Day is one of the best places online to get malicious PCAPs for learning and research. Be careful, they contain real malware and attacks but it is the perfect situation for our setup and study goals.
-
9Malware Traffic AnalysisVideo lesson
Malware Traffic Analysis has been around forever... and you'll see why in this short lecture! We'll take a quick flyover the site and show you how to grab the malicious PCAPs and writeups posted here.
-
10WiresharkVideo lesson
Wireshark ships with Kali and it's beautiful! Entire courses have been written on just this one tool (I know because I've written one... search on the site for the title). Wireshark is awesome - the GUI interface lowers the learning curve and you can quickly click a few buttons and get insights into PCAP traffic. Let me show you how! Let's go!
-
11tsharkVideo lesson
tshark is Wireshark's little command-line cousin. Jump into this micro lecture and get an overview of this tiny yet powerful tool.
-
12tcpdumpVideo lesson
Before there was Wireshark... there was TCPDUMP! Almost as old as the internet itself, tcpdump is a powerful weapon in a cyber threat hunters arsenal. Allow me to introduce the tool and show some basic features!
-
13ngrepVideo lesson
Most people have never heard of ngrep, even many seasoned cyber threat hunters haven't heard of it. GREP yes. ngrep? not so much. In this lecture we'll take a glance at functionality so we can use it to study PCAPs in later lectures! Let's go!
-
14capinfosVideo lesson
capinfos? What's that? It's a little tool for displaying PCAP Information! Yup! You'll like it because it gives you a 30,000 foot snapshot of a PCAP before you ever open it. It's fast. It's simple. It's capinfos! And it's waiting for..... you! Let's go!
-
15RITA: Installing MongoDBVideo lesson
Ahhhh RITA! Hands down my favorite free beacon detection tool on the internet right now. RITA is an advanced command and control channel detection tool that sifts through Zeek data mining out evil and surfacing it to you: the capable cyber threat hunter. Setup isn't supported on Kali Linux but in this lecture I'll show you how to bend the rules starting with our Mongo database. This will be the backend storage system for detected threats.
-
16RITA: Building RITA from SourceVideo lesson
And now the hard part: building RITA from source code? Yup! Don't worry, I'm going to careful, and patiently, walk you through the entire process from A to Z. By the end of this lecture you will have RITA successfully running on Kali Linux
-
17zeekVideo lesson
Installing Zeek on Kali Linux? Yup. So this is actually not as straight forward as it seems. You can't just download a zeek binary and call it a day. In this lecture I'm going to carefully walk you through the correct way to get zeek up and running in Kali. I'm also going to help you steer around common pitfalls people make during the installation. At the end, we'll verify everything is up and running as expected! Let's go!
-
18Using zeek + Rita to find Evil!Video lesson
READY TO THREAT HUNT YOUR FIRST INCIDENT!!?? It's about to happen - now. This is one of my favorite lectures in the course because... although I haven't even shared how to threat hunt you will still jump right into the deep end of the pool with me. Then in later lectures, we'll slow down as I carefully, and methodically, walk you through the hunting process and hunter's mindset.
-
19Understanding the New AdversaryVideo lesson
Hooded hackers in Grandma's basement are so... 1990's. Welcome to the modern adversary. In this lecture you'll take a walk with me in the woods of threat intelligence, the new threat scape and the advanced threat actor's we are fighting against! Let's go!!
-
20The Broken Threat Hunting MindsetVideo lesson
Learn why the current way organizations think about modern threats is... broken. :(
-
21The Modern Threat Hunting MindsetVideo lesson
Learn exactly what cyber threat hunting is. You'll learn about the detection gap and how cyber threat hunters close that gap and minimize adversarial dwell time. You'll also learn how to critically think about risk and make evidential backed security assessments. You'll also get the scoop on modern malware techniques and tactics. Let's go!
-
22Beaconing: BasicsVideo lesson
What is a beacon? By the end of this lecture you'll know! It will finally make sense... join me as we take a walk through the woods learning beaconing basics and how advanced adversaries compromise computers.
-
23Beaconing: DNSVideo lesson
DNS is used to resolve domain names into IP addresses. But what is a DNS beacon? How can you abuse this seemingly simple and benign process for evil? Join me as I share how the bad guys are doing it!
-
24Beaconing: CDNVideo lesson
Akamai, AWS, Cloudflare, Microsoft and others have content delivery networks known as CDNs. They help reduce latency by delivering content to the closest requesting computer. But bad guys are using it to obfuscate their C2 origins. How? Jump inside to learn. Now! lol let's go! :)
-
25Beaconing Detection: TimingVideo lesson
One way to detect beaconing is through timing. In this quick lecture I'll talk about a modern machine learning algorithm used to detect beacons and then I'll share the liabilities with this approach. Yup, machine learning isn't a panacea! You'll also learn how to carefully think about beacon detections so you can become a cyber superstar! haha
-
26Beaconing Detection: Session Size AnalysisVideo lesson
Session size analysis is amazing. In this lecture, I'm going to show you how to go from bytes to beacon in such a way that you can not only identify what commands were transferred but also identify the attackers kill chain stage even if all the traffic is encrypted. YUP. Learn you will learn this seemingly magical thinking process in five minutes.
-
27Finding Beacons: Long and Cumulative ConnectionsVideo lesson
There are two types of connection persistency: long connections and cumulative. In this lecture you'll learn what connection persistency, then we'll get hands on with Zeek, RITA, grep and some Linux BASH fu to find evil in a mystery pcap!
-
28Finding Beacons: Business Need Analysis (Part 1)Video lesson
In this lecture we're going to investigate a real incident containing a pcap where a threat actor used a non-malicious app, TeamViewer, for evil. You'll learn what Team Viewer is and then we'll twist, cut, slice and dice the pcap using zeek. There's a lot of zeek action going on in the lecture so get ready! Let's go!
-
29Finding Beacons: Business Need Analysis (Part 2)Video lesson
Let's see how deep this rabbit hole really goes. We'll get even deeper with Zeek, capinfos and other Linux tools to understand the traffic in our mystery pcap.
-
30Finding Beacons: Business Need Analysis (Part 3)Video lesson
We're going to the understand the business need by digging into the Zeek dns log. We're going to recursively filter the log, removing benign domains as we zero in on evil. We'll also look at the http and files Zeek logs and use AWK to pivot and understand the traffic flow!
-
31Finding Beacons: Business Need Analysis (Part 4)Video lesson
Now it's time to bring in RITA to see what we can find. You'll see RITA's beacon analysis, user-agent analysis and more. You'll also learn how to use open source tools to understand if there is business justification for a particular network flow.
-
32Finding Beacons: Unexpected app on Standard PortVideo lesson
Do you know the difference between unknown applications on standard ports vs known app on non-standard ports? You will after this lecture! We'll also get into JA3/S hashes and I'll share why they can help use understand unknown apps. Let's do this baby!
-
33Finding Beacons: Unexpected Protocol BehaviorVideo lesson
Quick quiz: can you imagine an example of unexpected protocol behavior? If you couldn't answer in five seconds you need to watch this two minute video! Let's go!
-
34Finding Beacons: Destination IP Reputation CheckVideo lesson
Let's do some research on that sketchy destination IP! Here's how to think through the vetting process...
-
35Finding Beacons: Internal Endpoint InvestigationVideo lesson
This is one of the most important lectures in this section of the course. You'll learn about the fuzzy line between threat hunting and forensic incident response and why you should never cross it without careful calculation!
-
36Suricata: Capabilities + Installation!Video lesson
Now it's time to install, incontestably, the most powerful open-source IDS in the world: Suricata. I'll take you through the process step by step, we'll modify the config file and I'll explain the ET-OPEN and ET-PRO rulesets. I'll even hint how you can LEGALLY grab the paid ET-PRO ruleset for free.
-
37Suricata vs RITA: Zeus MalwareVideo lesson
Now we're going to square off Suricata against RITA to show you why layered defenses are critical. Will Suricata detect the threat? Or will it miss it?
-
38Suricata vs RITA: Powershell EmpireVideo lesson
Okay, let's try this with a more advanced C2 framework: Powershell Empire by BC-Security. Will Suricata catch it?
-
39How to setup the Detection Lab in WindowsVideo lesson
It all starts with VMWare Workstation Pro running on a Windows Host.
-
40What you will build!Video lesson
In this lecture you will learn what you will build. Your lab will have Microsoft ATA, Splunk, Windows Event Forwarding, Powershell Transcriptoin logging, OS Query, Fleet, Sysmon, Zeek, Suricata, Guacomole, a Windows 10 endpoint, a Windows Server Domain Controller and more!
-
41Installing Vagrant DesktopVideo lesson
Now we need to grab and install Vagrant. Let's go!
-
42Installing the Vagrant VMWare PluginVideo lesson
Next, we need to install the VMWare Desktop Vagrant plugin. We do this through command line... but don't worry - it's super easy. I've got you covered in 90 seconds!
-
43Installing the Vagrant VMWare UtilityVideo lesson
And now we need the Vagrant VMWare Utility. Let's knock that out really quick.
-
44Downloading the DetectionLabVideo lesson
Alright, now it's time to download the Detection Lab and extract the setup file!
-
45Prepping the DetectionLabVideo lesson
Okay so before we jump in we need to make sure everything is going to work. So we can run the prepare Powershell script to make sure we have the green light to go. We're also going to cover a crucial subject: the Vagrant file and network subnets. We're going to intercept a common pitfall people experience during setup. Pay attention here and it will save you many hours of grief later!
-
46Setting up the VMWare NetworkVideo lesson
This IS the most important lecture for making the Detection Lab work. If your networking isn't setup correctly everything will fail. In this quick video I'll show you the EXACT network settings you need to have success with your cyber range! Let's do this baby!
-
47Logger SetupVideo lesson
Okay, now we're going to setup the first VM in the Detection Lab: Logger. This VM includes, Velociraptor, Splunk Zeek, Suricata and more so we need to make sure this one works. I'll share some of the problems I encountered along the way and provide tips to help you avoid them! Let's do this baby!!
-
48Domain Controller SetupVideo lesson
What's an Active Directory lab without a domain controller? NOTHING! haha, in this lecture we'll setup our DC and I'll share commentary during the installation process to help you avoid any setup errors you might encounter.
-
49Windows Event Forwarder SetupVideo lesson
What the heck is a WEF? hahaha it's the Windows Event Forwarder - it collects the logs from the DC and Windows 10 endpoint and ships it to Splunk for indexing. It also hosts our Microsoft ATA instance so we need to make sure we get this one right too. Don't worry - I got your back! I'll share tips and tricks as we set this one up. Follow my lead and you'll be good to go.
-
50Windows 10 Endpoint SetupVideo lesson
Now we create our employee endpoint. This is patient zero! The system we'll pop, infect and own in our lab. Let's set 'er up!

External Links May Contain Affiliate Links read more