Skip to content

Details

Join us for a hands-on threat hunting session where you'll learn to detect sophisticated attacks that abuse legitimate system tools and steal credentials!
What You'll Learn:

  • Identify living-off-the-land techniques (PowerShell, WMI, certutil abuse)
  • Spot credential dumping attacks (LSASS dumps, registry extraction)
  • Master Sysmon log analysis (ETW->EVTX->CSV/JSON workflow)
  • Build effective detection queries in Splunk

Hands-On Lab:

  • Analyze real attack scenarios using provided Sysmon datasets
  • Work with enterprise SIEM platforms (Splunk or ELK stack)
  • Create hunting queries and detection rules
  • Practice correlating events across multiple log sources

Who Should Attend: SOC analysts, threat hunters, incident responders, security engineers, cybersecurity enthusiasts, and beginners looking to level up their detection skills.

Cybersecurity
Education & Technology
New Technology
Hacking
Software Development

Members are also interested in