Online training teaches threat hunting and SOC building skills

Online training teaches threat hunting and SOC building skills

Share post

The new online training program "Security Operations and Threat Hunting" for experts, developed by Kaspersky specialists, supports companies in optimizing their Security Operations Center (SOC) or even setting it up from scratch.

It helps SOC and security teams optimize their threat hunting, incident detection and investigation capabilities. The course guides the participants through the SOC structure, threat intelligence and relevant attacks. The on-demand format and virtual hands-on exercises allow participants to complete the training at their own pace.

Every company is familiar with SOC challenges: staff shortages and a lack of knowledge and skills. The (further) development of the corresponding know-how and the resulting expertise is of great relevance for both companies and employees in order to increase security and advance professionally. However, when it comes to enterprise security operations and threat hunting, relying on content from proven cybersecurity experts is essential.

New cybersecurity training concept

Security Operations and Threat Hunting is a new course within the Kaspersky Expert Training portfolio. It offers comprehensive guidance on the topic from experienced experts, including the head of Kaspersky SOC, the head of Kaspersky SOC Consulting, SOC analysts and security researchers. In addition to the structure of the Security Operations Center, the expert roles, processes and tools, the focus of the training is on the tactics, techniques and procedures of modern attacks against Windows, Linux and networks and how these can be dealt with. Attacks such as Windows credentials dumping and exploitation of services, golden and silver tickets, Linux capabilities abuse and spoofing are dealt with here.

Students will gain a clear understanding of the SOC as part of a comprehensive cyber defense strategy, and will also learn how to plan and organize security monitoring, use threat intelligence services, and detect and investigate malicious activity via the ELK stack. This knowledge and skills are essential for specialists involved in security operations and threat hunting, including intermediate and advanced SOC professionals.

100 hours of practical exercises

The training includes a six-month access to the course and 100 hours of practical exercises. Participants can complete the course within six months of activating the access code – whenever and wherever they want.

“Companies need to close their knowledge gap and increase the effectiveness of their security measures. Although additional investments are always tricky, online education can help to achieve one's goals,” emphasizes Sergey Soldierov, Head of Kaspersky SOC. “With this business challenge in mind, we have developed a series of expert training courses on threat hunting, incident response and malware analysis, including this new training course. Kaspersky Expert Training combines our up-to-date expertise in a convenient, on-demand format, allowing participants to balance their training with professional responsibilities. The course is also suitable for individual professionals to improve their personal skills to further advance their careers.”

More at Kaspersky.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more