Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

OS Analysis with HELK

Course Cover
compare button icon

Course Features

icon

Duration

29 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

29 minutes

Course Description

Although many cyber attacks can be identified using endpoint log analysis, it is not possible to identify all of them. There are very few capabilities that only focus on the OS logs and OS data. This makes it difficult to do advanced statistical analysis. This course, OS Analysis using HELK, will show you how to use Hunt ELK to identify adversary endpoint attacks techniques in an enterprise environment. First, you will see how HELK can fill the gap left by Windows event log analysis. Next, we'll show you how to use the advanced hunt features offered by HELK. You'll also learn how to analyze live data to search for adversary activity. This course will equip you with the knowledge and skills to detect these techniques: Bits Jobs T1208, Kerberoasting T1208, and indicator removal on hosts using HELK.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn how to analyze a live dataset to hunt for adversary activity

When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques Kerberoasting T1208, Bits Jobs T1197, and indicator removal on hosts T1070 using HELK

Course Cover