RiseUpp Logo
Educator Logo

Threat Investigation

Master cybersecurity threat hunting, event correlation, and incident response with hands-on SOC analysis tools and techniques for security professionals.

Master cybersecurity threat hunting, event correlation, and incident response with hands-on SOC analysis tools and techniques for security professionals.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Cybersecurity Operations Fundamentals Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

5

(23 ratings)

2,514 already enrolled

English

Powered by

Provider Logo
Threat Investigation

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Understand and apply cyber-threat hunting concepts

  • Implement security event correlation and normalization

  • Conduct thorough security incident investigations

  • Use playbook models for security monitoring

  • Analyze threats using CVSS scoring system

  • Leverage security intelligence and analytics tools

Skills you'll gain

Cyber Threat Hunting
Security Event Analysis
CVSS Scoring
Incident Investigation
SOC Operations
Security Intelligence
Event Correlation
Threat Analytics

This course includes:

1.4 Hours PreRecorded video

24 quizzes

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive cybersecurity course focuses on threat investigation and analysis within Security Operations Centers (SOC). Students learn cyber-threat hunting concepts, event correlation, security incident investigations, and playbook modeling. The curriculum covers the Common Vulnerability Scoring System (CVSS), threat analytics, security intelligence feeds, and practical investigation procedures using Security Onion tools. Through hands-on exercises and real-world scenarios, participants develop essential skills for identifying, analyzing, and responding to emerging cyber threats.

Identifying Resources for Hunting Cyber Threats

Module 1 · 3 Hours to complete

Understanding Event Correlation and Normalization

Module 2 · 1 Hours to complete

Conducting Security Incident Investigations

Module 3 · 1 Hours to complete

Using a Playbook Model

Module 4 · 1 Hours to complete

Fee Structure

Instructor

Cisco Learning & Certifications
Cisco Learning & Certifications

4.9 rating

48 Reviews

60,197 Students

12 Courses

Network Automation and Security Courses

Cisco offers a diverse array of courses designed to build expertise in network automation and security, catering to professionals seeking to advance their skills in modern IT environments. Key offerings include Ansible for Network Automation, where learners automate network tasks, and DevOps for Network Automation (NetDevOps), which integrates DevOps practices with network operations. The Introduction to Network Automation course provides a solid foundation for beginners, while Model-Driven Programmability focuses on automating and orchestrating networks. Security-focused courses like Network Security, Data Security, and Security Operations Center (SOC) address the protection of network infrastructures, with additional specialized courses such as Threat Analysis, Threat Investigation, and Threat Response focusing on identifying, investigating, and responding to security threats. Furthermore, Using APIs for Network Automation teaches the application of APIs to streamline network management and automation. These courses enable professionals to gain cutting-edge skills in securing and automating networks, which are essential in today's rapidly evolving IT landscape.

Threat Investigation

This course includes

8 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.