25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting

Christopher Govender

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. If you know how most threat actors and groups attack their targets, you'll be better equipped to defend against those attacks. In this course, you'll explore the seven phases of the Cyber Kill Chain, which aims to guide defenders in their understanding of commonly used attack strategies. Next, you'll learn how tactics, techniques, and procedures can help you better understand the threats your organization faces. You'll move on to examine behavioral patterns typical with today's threat actors and advanced persistent threats. The average time it takes to detect a breach is around 200 days, which is why threat hunting has become a standard security practice. To complete this course, you'll explore threat hunting and its usefulness, as well as the concept of indicators of compromise (IoC). This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

Issued on

November 10, 2024

Expires on

Does not expire