Cyber Threat Hunting

Proactively Uncover Threats. Stay Ahead with Expert Cyber Threat Hunting Training.

Overview

Threat hunting is a proactive cybersecurity approach to identify unknown and ongoing adversaries and cyber threats that have remained undetected inside an organization’s network. By taking initiative to uncover footprints left by APTs, organizations look to act quickly and take appropriate measures to limit the impact on their environment or even stop the breach.

Course Focus Area

The Cyber Threat Hunting Training Course is designed to equip participants with the necessary skills and knowledge to proactively detect, investigate, and mitigate potential cyber threats within an organization. This course covers fundamental concepts, methodologies, and tools used in the field of cyber threat hunting. 

Expected Audience

  • Students aspiring to specialize in Threat Hunting.
  • Companies seeking to educate and strengthen their Threat Hunting Teams.
  • Cybersecurity practitioners wanting to enhance their knowledge in Threat Hunting and its applications.
  • Organizations planning to build or upskill a new team of Threat Hunters.

Pre-Requisites

  • Foundational understanding of cybersecurity principles, networking concepts, and incident response techniques
  • Experience with security information and event management (SIEM) tools is recommended
  • Recommended to to have a laptop/PC with a minimum (8 GB RAM and 4 CPU)

What You Will Learn

1. Introduction to Threat Hunting
  • What is cyber threat hunting?
  • Hunting versus Reactive Response
  • Threat hunting models
2. Threat Hunting Techniques and Methodologies
  • Structured hunting (MITRE)
  • Unstructured hunting
  • Entity driven hunting
3. Technologies in Threat Hunting Process
  • Network data analysis
  • Endpoint data anaysis
  • Threat Intelligence
  • SIEM
  • EDR, XDR and MDR platforms
4. Threat Hunting - Network Analysis
  • Network based threats
  • Basic protocol analysis
  • DNS abnormalities
  • Beacon Analysis
  • Volumetric Analysis
5. Threat Hunting - Endpoint Analysis
  • Host-based Threats
  • Mapping Attacks With MITRE Framework
  • Event ID Numbers For Hunting
  • Identifying Suspicious Services
  • Malicious Document Analysis
6. Threat Hunting - Hands on Practice
  • Adversary Emulation: Atomic Red Team + MITRE ATT&CK