Threat Hunter Battle Path
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions' Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Yextend
- Malware Analysis Introduction
- Linux Advanced Logging
Module 2
- Password Cracking
- Identifying NetworkIOCs: DNS Tunneling
- IOC Challenge
Module 3
- Netcat Introduction
- Adv. Privilege Escalation: Exposed and Reused Credentials
- Detecting Privilege Escalation
Module 4
- Metasploit Basics
- Reverse Engineering 1
- Proxychains
Module 5
- Reverse Engineering 2
- CVE-2020-7247 OpenSMTPD RCE
- Exposed and Reused Credentials Challenge
Module 6
- VE-2019-5736 Docker RunC Container Escape
- Keys to Useful Threat Intelligence
- Finding Patterns with YARA
Module 7
- Suricata Challenge
- Obfuscation Challenge
- Malware Cleanup Challenge
Module 8
- Splunk Lookups
- Splunk Input Configuration
- Linux Security Investigation Challenge
Module 9
- Web App Exploit Challenge Delta 1
- Web App Exploit Challenge Delta 2
- Web App Exploit Challenge Delta 3
Module 10
- SSH Backdoor Challenge 1
- SSH Backdoor Challenge 2
- SSH Backdoor Challenge 3
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions' Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Yextend
- Malware Analysis Introduction
- Linux Advanced Logging
Module 2
- Password Cracking
- Identifying NetworkIOCs: DNS Tunneling
- IOC Challenge
Module 3
- Netcat Introduction
- Adv. Privilege Escalation: Exposed and Reused Credentials
- Detecting Privilege Escalation
Module 4
- Metasploit Basics
- Reverse Engineering 1
- Proxychains
Module 5
- Reverse Engineering 2
- CVE-2020-7247 OpenSMTPD RCE
- Exposed and Reused Credentials Challenge
Module 6
- VE-2019-5736 Docker RunC Container Escape
- Keys to Useful Threat Intelligence
- Finding Patterns with YARA
Module 7
- Suricata Challenge
- Obfuscation Challenge
- Malware Cleanup Challenge
Module 8
- Splunk Lookups
- Splunk Input Configuration
- Linux Security Investigation Challenge
Module 9
- Web App Exploit Challenge Delta 1
- Web App Exploit Challenge Delta 2
- Web App Exploit Challenge Delta 3
Module 10
- SSH Backdoor Challenge 1
- SSH Backdoor Challenge 2
- SSH Backdoor Challenge 3