0345 4506120

Certified Cyber Threat Hunter

This is a specialist-level course for those security professionals involved in penetration testing, incident response and security analysis looking to develop in their role and others wishing to enhance their proactive skills in detecting and mitigating threats.

WHO SHOULD ATTEND?

Experienced cyber security incident responders, SOC and security analysts and penetration testers looking to enhance their skillsets or better understand the footprints their activities may leave behind.

Reset

Learning Objectives

WHAT WILL I LEARN?

You will learn and practice the skills and understanding needed to conduct a thorough threat hunt within a live enterprise environment

UPON COMPLETION OF THE COURSE YOU WILL HAVE LEARNT:

  • How to correlate and analyse data to successfully identify active and passive threats already existing within a network
  • How to effectively conduct and automate data collection from remote locations using built-in and third party tools so that vital clues and potential threats will not be missed

HOW WILL I BENEFIT?

This course will give you:

  • The skills to undertake your own threat hunts and develop your methodologies
  • The ability to understand and correlate separate artefacts into larger patterns to better identify potential threats

Pre-Requisites

This is not a beginner’s course. Delegates wishing to attend should have a good working knowledge of the incident response process, requirements and technical methods used. Fundamentals of penetration testing and attack techniques, basic understanding of network nodes, traffic and host-based artefacts are also a prerequisite.

Course Content

Throughout the course, your time will be split between learning the methods and principals required to conduct a successful threat hunt within an enterprise environment and applying these in practical, hands-on exercises based on real-life scenarios.

Topics covered will include:

1. Applicable law and standards

a. Relevant legislation

b. ISO Standards

c. Competency

2. Theory & models

a. What is Threat Hunting?

b. Hunting principals

c. Relevant frameworks

d. Threat types

3. Computer networks & environments

a. Network infrastructure

b. Network nodes

4. Practical considerations

a. Security monitoring

b. Operating System-based

c. File System-based

d. Network-based

5. Information gathering & data collection

a. Scoping

b. Existing information

c. Scripting and automation

d. Tools & techniques

e. Data collection

6. Interpretation and analysis

a. Data aggregation & normalisation

b. Interpretation

c. Analysis

7. Threat hunting exercises

a. Three 1 day labs

b. Realistic threat hunting scenarios

c. In-depth learning of relevant attacker tactics, threats and procedures

8. Practical final exercise and exam based on the methods and techniques learned throughout the course

Exams & Certification

WHAT QUALIFICATION WILL I RECEIVE?

Upon successful completion of the exam, you will be awarded the Certified Cyber Threat Hunter qualification.

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include