Aegis School of Business, Data Science, Cyber Security & Telecommunication
|Application fee:||100 INR|
|Course fee:||25000 INR|
The main objective of this course is to actively looking for threat actors in Organization network. Threat intelligence solutions gather raw data about emerging or existing threat actors and threats from a number of sources. This data is then analysed and filtered to produce threat intel feeds and management reports that contain information that can be used by automated security control solutions. Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data.
Threat intelligence and threat hunting are two distinct security disciplines that can be complimentary. For example, threat intelligence can make up a small portion of the threat hunting process.
However, subscribing to a threat intelligence feed does not automatically satisfy the need to threat hunt your network. A proper threat hunt can identify threats even when they have not yet been seen in the wild.