This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Education Courses
  • NetWitness Community
  • NetWitness Education
  • Courses
  • NetWitness Platform Introduction to Hunting 11.6 ILT
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

NetWitness Platform Introduction to Hunting 11.6 ILT

ElynnKoh
Contributor ElynnKoh Contributor
Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

on ‎2021-10-25 06:44 AM - edited 3 weeks ago by Occasional Contributor aymanm2 Occasional Contributor

Netwitness-Education-2C (2).png


Access Training
for Customers/Partners
Access Training
for NetWitness Employees

 

 

 

$2,000 USD

 

 

2,000 Training Credits

 

 

 

This is an Instructor Led Training class, for On-Demand/Self-Paced please click here

 

Summary

Interested in hunting? This course is a great place to begin as we will give you a recommended approach for identifying threats using the NetWitness Platform.
This is an update to version 11.6. 

 

Overview

This course covers how to use the NetWitness 11.6 Platform including Logs, Packets and Advanced Endpoint, to find threats in the environment using a recommended methodology. 

 

Audience

Anyone interested in hunting with the NetWitness Platform

 

Duration: 2 days

 

Prerequisite Knowledge/Skills

Introduction to the NetWitness Platform 
NetWitness Platform Foundations 
NetWitness Platform Analysis 

 

Course Objectives

Upon completion of this training, the learner should be able to: 

  • Describe threat hunting and incident response roles 
  • Describe the Hunting Guide 
  • Describe the hunting methodology 
  • Describe the Hunting Pack meta  
  • Describe the UEBA Essentials Content Pack 
  • Describe the UEBA Essentials Hunting Guide 
  • Understand the MITRE’s ATT&CK ™ frameworks  
  • Describe NetWitness Hunting Cards 
  • Describe the basics of hunting with NetWitness Endpoint  
  • Describe NetWitness Platform hunting tools 
  • Identify protocol/service anomalies 
  • Identify indicators of malicious traffic 
  • Use hunting techniques, methodology and tools to detect threats 
  • Respond to incidents 
  • Report findings 

 

Course Outline

Module 1: Hunting Techniques and Methodology 
Module 2:
Finding Anomalies 
Module 3:
Documenting Threats

 

If you have any questions, please contact your account manager or Contact Us directly!
Was this article helpful? Yes No
3 Likes
Share
Version history
Last update:
3 weeks ago
Updated by:
Occasional Contributor aymanm2 Occasional Contributor
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.