Skill assessment
Skill assessment | 20 questions
See how your cyber threat hunting skills stack up against other professionals in your field.
Cyber Threat Hunting Project
Project | 2 hours 31 minutes
Use your cyber threat hunting skills to identify network traffic patterns for anomalies and investigate malware. You’ll use Wireshark to examine packet capture files for potential red flags. Then you’ll attempt to piece together the threat.
Introduction to Cyber Threat Hunting Techniques
Course | 57 minutes
Increase your knowledge of cyber threat hunting techniques and resources available. Here, we will introduce you to the Cyber Threat Hunter.
Detection
Course | 2 hours 24 minutes
In order to have an effective threathunting program, the hunter needs access to the tools and data necessary to perform these tasks. The best open-source tools are free and only work on Linux. Let’s talk about some of those tools.
Investigation Process
Course | 1 hour 10 minutes
The purpose of this course is to help the threat hunter to identify whether the anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away.
Remediate the Malware
Course | 25 minutes
Go through the skills and tools needed to identify and remediate malware. You’ll look at identifying malware propagation techniques, ensuring it doesn’t spread, preventing future infiltration attempts and more.
Attack Simulators and Exercises
Course | 1 hour 2 minutes
In this course, we will be looking at attack simulators, which will be used to test your monitoring and alerting solutions.
Cyber Threat Hunting Review
Course | 9 minutes
Review the steps of cyber threat hunting: Detect, Investigate and Response/Remediation. Finally, you’ll recap on the threat hunter’s duties and responsibilities in preparation for the final project.
Skill assessment
Skill assessment | 20 questions
See how your cyber threat hunting skills stack up against other professionals in your field.
Cyber Threat Hunting Project
Project | 2 hours 31 minutes
Use your cyber threat hunting skills to identify network traffic patterns for anomalies and investigate malware. You’ll use Wireshark to examine packet capture files for potential red flags. Then you’ll attempt to piece together the threat.
Introduction to Cyber Threat Hunting Techniques
Course | 57 minutes
Increase your knowledge of cyber threat hunting techniques and resources available. Here, we will introduce you to the Cyber Threat Hunter.
Detection
Course | 2 hours 24 minutes
In order to have an effective threathunting program, the hunter needs access to the tools and data necessary to perform these tasks. The best open-source tools are free and only work on Linux. Let’s talk about some of those tools.
Investigation Process
Course | 1 hour 10 minutes
The purpose of this course is to help the threat hunter to identify whether the anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away.
Remediate the Malware
Course | 25 minutes
Go through the skills and tools needed to identify and remediate malware. You’ll look at identifying malware propagation techniques, ensuring it doesn’t spread, preventing future infiltration attempts and more.
Attack Simulators and Exercises
Course | 1 hour 2 minutes
In this course, we will be looking at attack simulators, which will be used to test your monitoring and alerting solutions.
Cyber Threat Hunting Review
Course | 9 minutes
Review the steps of cyber threat hunting: Detect, Investigate and Response/Remediation. Finally, you’ll recap on the threat hunter’s duties and responsibilities in preparation for the final project.