25,000+ Courses Nationwide
0203 908 2376

Certified Cyber Threat Hunter

This is a specialist-level course for those security professionals involved in penetration testing, incident response and security analysis looking to develop in their role and others wishing to enhance their proactive skills in detecting and mitigating threats.



Experienced cyber security incident responders, SOC and security analysts and penetration testers looking to enhance their skillsets or better understand the footprints their activities may leave behind.

Select specific date to see price, venue and full details.

Learning Objectives


You will learn and practice the skills and understanding needed to conduct a thorough threat hunt within a live enterprise environment



• How to correlate and analyse data to successfully identify active and passive threats already existing within a network

• How to effectively conduct and automate data collection from remote locations using built-in and third party tools so that vital clues and potential threats will not be missed




This course will give you:

•The skills to undertake your own threat hunts and develop your methodologies

•The ability to understand and correlate separate artefacts into larger patterns to better identify potential threats








































This is not a beginner’s course. Delegates wishing to attend should have a good working knowledge of the incident response process, requirements and technical methods used. Fundamentals of penetration testing and attack techniques, basic understanding of network nodes, traffic and host-based artefacts are also a prerequisite.

Course Content

Throughout the course, your time will be split between learning the methods and principals required to conduct a successful threat hunt within an enterprise environment and applying these in practical, hands-on exercises based on real-life scenarios.


Topics covered will include:


1. Applicable law and standards

a. Relevant legislation

b. ISO Standards

c. Competency


2. Theory & models

a. What is Threat Hunting?

b. Hunting principals

c. Relevant frameworks

d. Threat types


3. Computer networks & environments

a. Network infrastructure

b. Network nodes


4. Practical considerations

a. Security monitoring

b. Operating System-based

c. File System-based

d. Network-based


5. Information gathering & data collection

a. Scoping

b. Existing information

c. Scripting and automation

d. Tools & techniques

e. Data collection


6. Interpretation and analysis

a. Data aggregation & normalisation

b. Interpretation

c. Analysis


7. Threat hunting exercises

a. Three 1 day labs

b. Realistic threat hunting scenarios

c. In-depth learning of relevant attacker tactics, threats and procedures


8. Practical final exercise and exam based on the methods and techniques learned throughout the course


Exams & Certification


Upon successful completion of the exam, you will be awarded the Certified Cyber Threat Hunter qualification.

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best