Threat Hunting Course

40

Hours

2

Hands on Excercises

Intermediate

Skill Level

Security Professionals

Audience

English

Language

Share This Class:

Share on facebook
Share on twitter
Share on linkedin

Overview

Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network.  Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

The course offers a target search approach, using networks and datasets to identify threats when the goal is to find opponents’ tactics, techniques and procedures.  This is an advanced security practice seen only in organizations that are at the peak of security efforts.  It represents an effective weapon against advanced cyber threats.

The course is designed for participants who see themselves immersed in the cyber world of analyst professions, Blue Team, SOC.

Completing this course will prepare you to:

Who is the course for?

Security Professionals:
  • Network security professionals and incident responders who will be using security and logging products to assist with their network and endpoint hunting responsibilities.

Prerequisites
  • Candidates with experience in incident response

What people are saying

Are You Ready To Start Your Career in Cyber security?

More Courses

You might also be interested in these courses

Incident Response - Intermediate

Incident Response - Intermediate

Quick and accurate responses to vital security incidents, and course students will be able to provide important answers, such as the entry point to the organization, how many positions were recorded, how to sign the attack, etc. This course is intended for people with backgrounds in operating and communication systems.

Incident Response - Intermediate

Quick and accurate responses to vital security incidents, and course students will be able to provide important answers, such as the entry point to the organization, how many positions were recorded, how to sign the attack, etc. This course is intended for people with backgrounds in operating and communication systems.
View Course

Intro to Red Team

Intro to Red Team

In this course, the students learn Python first to create and develop new tools to help them achieve the PT goals. There are 3 penetration testing cases that each student needs to pass and learn throw each one of them new attacking skills.

Intro to Red Team

Audience: Security Professionals
  • Technically skilled SOC analyst, IT or developer who wish for a penetration testing or Red Team job
View Course

Curriculum

Methodology, Framework & Tools
Vectr.io SIGMA
Endpoint Tools & Analysis
PowerShell GPO & Sysmon Linux Audit EDR
Network
MITM Proxy Bro Snort SOF-ELK
Organization
O365 ATA Splunk

The Market-Leading Cybersecurity Training and Simulation Platform

used by

Contact Us

  • This field is for validation purposes and should be left unchanged.
CONTACT

Start a rewarding career in cyber security!

+1 (210)729 6460

OUR ADDRESS

Cyber Range Solutions Inc
8000 IH 10 West Suite 600
San Antonio TX 78230

Cyber Range Solutions Inc. All Rights Reserved.

Book A Live Demo