InfoSec Cyber Threat Hunting boot camp course
Advance your career in the field of cybersecurity by learning how to threat hunt from possible cyber attacks .
InfoSec Cyber Threat Hunting boot camp course provides how to find, assess and remove threats from your organization. The Cyber Threat Hunting Boot Camp is designed to prepare you for the Certified Cyber Threat Hunting Professional exam. Course cover hand-ons on cyber range exercises.
› Course objectives:
› Infosec’s Cyber Threat Hunting boot camp course covers security analysis, establishing a secure threat-hunting setup, successful hunt patterns and liaising with security operations center personnel to cover all angles of attack while the threat is ongoing.
› This boot camp course focuses on teaching you the key threat hunting process and procedures;
› Learn – How to threat hunt different types of threats
› Gather – Logs, capture data and search for malware activity across estate
› Hands-on – Practice hands-on threat hunting in a virtualized environment
› Contact us for course brochure.
› The skills learnt help with following cybersecurity job roles;
» Penetration testers
» Red team members and other white hats
» Incident-response team members
» Security analysts
» Engineers specializing in network security or IT
» Security consultants and auditors
» Managers wanting to create threat-hunting teams within their own companies
After attending the Cyber Threat Hunting Boot Camp, you will have the knowledge and skills to:
» Think tactically regarding cyber threat defense
» Use threat intelligence to form your own hypotheses and begin the hunt
» Anticipate and hunt down threats in your organization’s systems
» Inspect network information to identify dangerous traffic
» Understand the Hunting Maturity Model to measure your organization’s hunting capability
» Learn how to find and investigate malware, phishing, lateral movement, data exfiltration and other common threats
» 100% Satisfaction Guarantee
» Five days live, expert instruction (live online or in-person)
» Immediate access to Infosec Skills from the minute you enroll to 90 days after your boot camp
» Learn by doing with 100s of additional hands-on courses and labs
» 90-day access to all boot camp video replays and materials
» Knowledge Transfer Guarantee
Pre-requisites:
» Understanding of fundamental information security concepts
» Working knowledge of networking devices and protocols
» Exposure to pentesting and network monitoring tools and methodologies
» Basic knowledge of Linux and Windows command line
» Bonus boot camp prep course is included.
» We recommend taking out Cybersecurity Foundation Course, 30 days before starting cybersecurity bootcamp course.
› The course is available in 3 delivery methods;
- Online
- In person
- Team Onsite (for North America, Canada/USA only)
› Infosec instructors have at least 10 years of industry training experience and are professionals with active roles in the
industry.
› Come learn from industry experienced instructors!
› OPTION #1: Online bootcamp dates:
Feb 7 – Feb 9
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
May 17 – May 19
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Jul 6 – Jul 8
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Sep 7 – Sep 9
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Nov 21 – Nov 23
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
Corporate:
If you have a larger team needing training, please contact us for a custom quote.
Custom schedule dates are available.
Contact us for details.
Individuals:
- Live instructor online bootcamp – $2500 usd
Contact us to Enroll
Achieving the Cyber Threat Hunting Professional Certification Credential
CCTHP exam objectives:
The Certified Cyber Threat Hunting Professional (CCTHP) certification is designed to certify that candidates have expert-level knowledge and skills in cyber threat identification and threat hunting.
The CCTHP body of knowledge consists of five domains covering the responsibilities of a cyber threat hunter.
Questions: The certification exam is a 50-question MCQ test
Duration: 2 hours
Domains covered:
5 CCTHP domains are:
» Cyber threat hunting definition and goals
» Cyber threat hunting methodologies and techniques
» Hunting for network-based cyber threats
» Hunting for host-based cyber threats
» Cyber threat hunting technologies and tools
Cyber Threat Hunting boot camp course – Key Features
› Exam Pass Guarantee (live online): 1 re-take is free, if you don’t pass on 1st attempt
› Cyber Threat Hunting Professional (CCTHP) exam voucher: included
› Unlimited CCTHP practice exam attempts: included
› Cyber Threat Hunting boot camp course: 3-day live instructor boot camp course (online or in-person)
› InfoSec skills boot camp course: Immediate access to Infosec Skills — including a bonus boot camp prep course — from the minute you enroll to 90 days after your boot camp
› 100% Satisfaction Guarantee
› Hands-on labs: Learn by doing with 100s of additional hands-on courses and labs. Practice threat hunting in virtualized lab environment that simulates a full range of servers and services used in real-world company.
› 90-day access to all boot camp video replays and materials
› Knowledge Transfer Guarantee: If an employee leaves within three months of obtaining certification, Infosec will train a different employee for free for up to one year
Cyber Threat Hunting boot camp – course topics
Introduction to cyber threat hunting
» What is threat hunting?
» Assumption of breach
» The concept of active defense
» Role of threat hunting in organizational security program
» Threat hunting benefits
Threat hunting process
» Preparing for the hunt: the hunter, the data, the tools
» Creating a context-based hypothesis
» Starting the hunt (confirming the hypothesis)
» Responding to the attack
» Lessons learned
Threat hunting methodologies
» The Crown Jewel Analysis (CJA)
» Cyber threat patterns and signatures
» Utilizing threat intelligence
» Threat hunting hypotheses: intelligence-driven, awareness-driven, analytics-driven
Threat hunting techniques
» Searching
» Cluster analysis
» Grouping
» Stack counting Preparing for the hunt
» What data do you need and how to get it?
» Host and network visibility
» Data gathering and analysis tools
» Commercial and open-source threat hunting solutions
The hunt is on
» What threats can be hunted?
» Introduction to IOCs and artifacts
» IOCs and IOAs
» Cyber kill chain
Hunting for network-based threats
» Network hunting overview (networking concepts, devices and communications, hunting tools)
» Hunting for suspicious DNS requests and geographic abnormalities
» Hunting for DDoS Activity
» Hunting for suspicious domains, URLs and HTML responses
» Hunting for irregular traffic: misused protocols, port-application mismatches, web shells and other threats
Hunting for host-based threats
» Endpoint hunting overview (Windows and Linux processes, file systems, registry, hunting tools)
» Malware (types, common activities, AV evasion, detection and analysis tools and methods)
» Hunting for irregularities in processes
» Hunting for registry and system file changes
» Hunting for filenames and hashes
» Hunting for abnormal account activity (bruteforce attacks, privileged accounts)
» Hunting for swells in database read volume
» Hunting for unexpected patching of systems
Utilizing system and security event data
» Event logs and IDs
» Logging on Windows and Linux
» SIEM
» Using event data during hunts
Advanced threat hunting concepts
» OODA (Observe, Orient, Decide, Act) loop
» Going beyond IOCs: hunting for advanced threats
» Chokepoint monitoring
» Deceptive technologies
» Developing an effective threat-hunting program
» Building customized threat-hunting tools
» Threat hunting best practices and resources CCTHP exam
Cyber Threat Hunting boot camp course enrollment
Learning Method: Self paced online, In-person, Team on-site
$2500 USD
Where do you from here?
You’re on a great start with Ethical Hacking and Pentest+ certification. Where do you go from here?
Next in the training path are specialization courses that are available FREE to you;
» Ethical Hacking and PenTest+ boot camp (CEH and PenTest+ certification)
» Advanced Ethical Hacking boot camp (CPENT certification)
» Advanced Pentests 10-day training
» Cloud Penetration Testing boot camp
» Incident Response and Network Forensics boot camp course
InfoSec Accredited Training Partner
We’re and Authorised and Accredited InfoSec Training Partner. We specialize in providing InfoSec cybersecurity skills development and InfoSec Security Awareness Training for Corporations and Individuals
Error: Contact form not found.