Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Threat Hunting with Yara

Course Cover
compare button icon

Course Features

icon

Duration

73 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

73 minutes

Course Description

Advanced malware threats are not being detected by traditional hash-based detections. This course, Threat Hunting using Yara, will teach you how to use Yara for identifying and clarifying malicious artifacts. You will learn how to create effective rules. Next, you will be able to craft detections based upon patterns found in suspicious binaries. Finally, you will explore hunting strategies at scale using Yara rules and other security capabilities. This course will equip you with the skills and knowledge to hunt for threats using Yara in response to security incidents.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

First you will discover how to write effective rules, next you will craft detections based on patterns identified in suspicious binaries, finally you will explore hunting at scale strategies using yara rules with other security capabilities

In this course, threat hunting with yara, you will gain the ability to use yara to identify and clarify malicious artifacts

When you're finished with this course, you will have the skills and the knowledge of hunting for threats with yara when responding to security incidents

Course Cover