the_Grinch wrote: » For the person who gave me negative rep for stating that the course would appear to be like the SEC511 course I have a number of points. First, grow up. The comparison was not one in respect to the quality of offerings from either merely speaking to what it might possibly relate to. Second, have some courage and list who you are after giving rep (as I do after every rep positive or negative I give). Third, my suggest would be for you to delete your account (as you so tactfully told me to do) as you are most likely not a valued member of this community.
vynx wrote: » so its more likely SOC operations / monitoring ?
ottucsak wrote: » Too soon after the PTX. I would jump on this but the time limited labs mean that I would not have enough time to finish it.
cyberguypr wrote: » Threat hunting IS a blue team endeavor. For those unfamiliar with the concept head here for a quick read: https://sqrrl.com/media/Framework-for-Threat-Hunting-Whitepaper.pdf
joneno wrote: » the_grinch - it's probably one of their marketing staff with a fake ID here. I won't be surprised I get one too lol.
JensBada wrote: » Jens here from eLS - No we didn't You should know by now that we are happy about all honest and real comments and suggestions from you guys, whatever direction they go THP will be revealed soon enough btw, only 1 week to go...
the_Grinch wrote: » Pretty sure he was referring to the other company and not yours
monkykap wrote: » Wanted to really like this course since this is a super relevant skill and involves my day to day work (logging pipeline/threat hunting). But unfortunately i've already dug into some of these topics that concern threat hunting at scale such and Windows Events, ELK, sysmon, looking for PTH etc. But i'm afraid it probably only covers these topics at a surface level which would not help me that much. The course also looks really short, only 3 sections with one section full intro on things such as what is incident response, threat hunting, IOC, STIX. Basically introduction into what could be several courses (Threat Intelligence, Incident Response/Forensics, SIEM, Threat-hunting). Therefore it only covers surface level of these topics (like using redline). If it had just focused on threat-hunting and specific use cases i think it would have warranted the purchase. Only conceivable way would be 4 in a box promotion if i could get it covered in next year's training budget. On it's own i can't justify taking this course...
McxRisley wrote: » ...lot of what their courses have to offer can easily be found online for free...
EnderWiggin wrote: » This course and PTX feel like they're both half courses... They don't really have enough content to stand on their own separately. If the two were combined together, then it would be a solid course, but alone? Neither is worth it... Especially not at a price that's higher than the rest of eLS courses.
cyberguypr wrote: » Well, this applies to virtually everything that is not vendor-specific. SANS has made millions with this model so it definitely works and it's obvious there's tangible value with structured learning for many.
McxRisley wrote: » If you read the rest of what I said, "Now I realize this is the case for a lot of things BUT there are some courses that you can't learn everything they have to offer by using google", I don't disagree with you. People take SANS training for the experience with the instructors and the unique stories and methods of learning things. eLS offers NONE OF THOSE THINGS and carries no weight in the industry as of right now either. EDIT: Apparently somebody doesn't like my opinions on eLS either. Thanks for the negative rep! (as if I care)