Cyber Threat Hunting
Rated 3.5/5 based on 11 customer reviews

Cyber Threat Hunting

Available: Out of Stock
$0.00

Request Info
The Cyber Threat Hunting Learning Path helps you master a repeatable, documentable cyber threat hunting methodology. You’ll learn how to leverage a variety of tools to assist with your cyber threat hunting activities.

Skill assessment

Skill assessment | 20 questions

See how your cyber threat hunting skills stack up against other professionals in your field.

Cyber Threat Hunting Project

Project | 2 hours 31 minutes

Use your cyber threat hunting skills to identify network traffic patterns for anomalies and investigate malware. You’ll use Wireshark to examine packet capture files for potential red flags. Then you’ll attempt to piece together the threat.

Introduction to Cyber Threat Hunting Techniques

Course | 57 minutes

Increase your knowledge of cyber threat hunting techniques and resources available. Here, we will introduce you to the Cyber Threat Hunter.

Detection

Course | 2 hours 24 minutes

In order to have an effective threathunting program, the hunter needs access to the tools and data necessary to perform these tasks. The best open-source tools are free and only work on Linux. Let’s talk about some of those tools.

Investigation Process

Course | 1 hour 10 minutes

The purpose of this course is to help the threat hunter to identify whether the anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away.

Remediate the Malware

Course | 25 minutes

Go through the skills and tools needed to identify and remediate malware. You’ll look at identifying malware propagation techniques, ensuring it doesn’t spread, preventing future infiltration attempts and more.

Attack Simulators and Exercises

Course | 1 hour 2 minutes

In this course, we will be looking at attack simulators, which will be used to test your monitoring and alerting solutions.

Cyber Threat Hunting Review

Course | 9 minutes

Review the steps of cyber threat hunting: Detect, Investigate and Response/Remediation. Finally, you’ll recap on the threat hunter’s duties and responsibilities in preparation for the final project.

The Cyber Threat Hunting Learning Path helps you master a repeatable, documentable cyber threat hunting methodology. You’ll learn how to leverage a variety of tools to assist with your cyber threat hunting activities.

Skill assessment

Skill assessment | 20 questions

See how your cyber threat hunting skills stack up against other professionals in your field.

Cyber Threat Hunting Project

Project | 2 hours 31 minutes

Use your cyber threat hunting skills to identify network traffic patterns for anomalies and investigate malware. You’ll use Wireshark to examine packet capture files for potential red flags. Then you’ll attempt to piece together the threat.

Introduction to Cyber Threat Hunting Techniques

Course | 57 minutes

Increase your knowledge of cyber threat hunting techniques and resources available. Here, we will introduce you to the Cyber Threat Hunter.

Detection

Course | 2 hours 24 minutes

In order to have an effective threathunting program, the hunter needs access to the tools and data necessary to perform these tasks. The best open-source tools are free and only work on Linux. Let’s talk about some of those tools.

Investigation Process

Course | 1 hour 10 minutes

The purpose of this course is to help the threat hunter to identify whether the anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away.

Remediate the Malware

Course | 25 minutes

Go through the skills and tools needed to identify and remediate malware. You’ll look at identifying malware propagation techniques, ensuring it doesn’t spread, preventing future infiltration attempts and more.

Attack Simulators and Exercises

Course | 1 hour 2 minutes

In this course, we will be looking at attack simulators, which will be used to test your monitoring and alerting solutions.

Cyber Threat Hunting Review

Course | 9 minutes

Review the steps of cyber threat hunting: Detect, Investigate and Response/Remediation. Finally, you’ll recap on the threat hunter’s duties and responsibilities in preparation for the final project.