Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js Typescript HTML5 PHP
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Data Analysis Data Warehouse Blockchain Business Intelligence
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin SwiftUI Mobile App Development
Graphic Design Photoshop Adobe Illustrator Drawing Canva Digital Painting InDesign Design Theory Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Emotional Intelligence Coaching
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Online Business Startup Business Plan Blogging Amazon Kindle Direct Publishing (KDP)
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Copywriting Google Analytics Email Marketing Startup Advertising Strategy

IT & SoftwareNetwork & SecurityCyber Security

Cybersecurity Threat Hunting for SOC Analysts

Get modern blue team skills for finding covert threats in enterprise networks.
Rating: 4.4 out of 54.4 (172 ratings)
2,784 students
Created by Vonnie Hudson
Last updated 3/2022
English
English [Auto]

What you'll learn

  • Finally feel like you KNOW what you're talking about (say goodbye to imposter syndrome)
  • Find zero-day network threats and malware in modern enterprise networks.
  • Use industry standard security tools to detect evil in organization networks.
  • Execute offensive hacking tools to generate telemetry for detection engineering.
  • Build a self-contained hacking lab, hosted on your laptop, to practice and building cyber confidence
  • Learn advanced Linux and Powershell command line tricks specifically crafted for threat hunting!

Requirements

  • A Windows Laptop
  • 16GB RAM (for the DetectionLab)
  • A curious heart hungry to learn :)

Description

Zeek + Suricata.

Splunk.

Sysmon.

Microsoft Advanced Threat Analytics.

TCPdump + ngrep

Wireshark + tshark.

Wait, I'm not done.

capinfos.

RITA.

Bloodhound.

Bad Blood.

Detection Lab.

Metasploit + msfvenom + Meterpreter + Process Injection.

Mimikatz.

OS Query.

Velociraptor + Memory Forensics.

Taking a breath... one sec... okay..

Fleet.

MITRE ATT&CK.

MITRE Caldera.

Prelude Operator.

Atomic Red Team.

Purple Sharp.

Boss of the SOC???

Yup.

This is one course. One source.  One resource that has the potential to change your professional life.

Check out the free content and level up your cyber skills by learning how to become a threat hunter...

Everything is step by step.

You will learn how to detect advanced threat actors on enterprise networks...

How will you learn this?

By building a modern lab replete with a Domain Controller, Windows 10 endpoint instrumented with Powershell logging, Sysmon, OS Query, Velociraptor and more.  

You will attack and detect threats like a pro. 

This was the dream course I wish I had when I was getting into cyber.

Everything is carefully, patiently and thoughtfully explained. 

It took me two months to build this course and I've poured my heart and soul into every lecture. 

If you're trying to get into cybersecurity from another career or you're curious how the bad guys breach and persist in networks then this course is for you.  I've not held anything back.  Everything you need to become a competent threat hunter is included in over 8 hours of content.

Are you ready?

I am! sign-up now and let's get started!

Who this course is for:

  • New Security Operations Center ("SOC") analysts
  • New and Intermediate Cyber Threat Hunters
  • New and Intermediate Penetration Testers
  • New and Intermediate Red Team Operators
  • Cybersecurity Managers
  • IT professionals (trying to get into cyber)
  • Accountants, Lawyers and... really ANYONE curious about Cybersecurity!

Instructor

Vonnie Hudson
Ethical Hacker and Teacher
Vonnie Hudson
  • 4.5 Instructor Rating
  • 899 Reviews
  • 7,765 Students
  • 22 Courses

I'll never forget the day I first got hacked.

I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system.

I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room.

Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun.

But one day I met my match.

I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer.

For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish.

I was freaking out! It's really hard to describe just how scary this was.

I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567"

This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love.

That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened.

Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world.

Since then I've never looked back.

So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York.

I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list.

My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux.

I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH.

I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride!

I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside!

Thanks again

-Vonnie

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Terms
  • Privacy policy
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.