Threat Hunting Course

 

Threat Hunting Course Syllabus

Threat hunting is an essential element of IT security for detecting and solving the most damaging threats, yet only a fraction of organizations have invested in this approach, and unfortunately even less organizations train their teams to detect advanced threats.
But although the threat landscape is very serious, in recurrent ways, cybersecurity teams aren’t taking the necessary steps to keep their organizations secure.
Threat hunting is a relatively new approach to cybersecurity, but organizations have been using it since 2003; Companies that use threat hunting implement eight key practices and more than 30 discrete tactics that allow them to find vulnerabilities in systems.
These practices help security teams find vulnerabilities in every layer of the software, including the data layer.

This Training have a component of 70% Practice and Labs and 30% Theory.

Threat Hunting is the process followed by a cybersecurity analyst proactively using manual or automated techniques and tools to identify security incidents or threats affecting an specific infrastructure.

After finishing the course the participants will have the necessary knowledge of the basic tools to be used to monitor a local network, detect usage patterns, abnormal behavior and potential intrusions. They will also be able to perform  security checks on the main services available.

Some Objectives:

  • To learn strategies for monitoring and analyzing traffic on TCP/IP networks.

  • To identify objectives to be monitored in the local network.

  • To learn tools for analyzing traffic data and Intrusion detection.

  • Introduction and Concepts
    • Networking
    • Communication Protocols
    • OSI Model
    • TCP Model
    • Advanced Networking
  • Vulnerabilities, Threats and Attacks Detection
    • Methodology
    • Main Vulnerabilities
    • Main Threats
    • Management
    • Detection
    • Base Line
    • Hardening
  • Network Architecture
    • Types
    • VLan
    • Subnetting
    • Supernetting
    • Simulation
  • Incident Response
    • Incident Management
    • CSIRT
    • CERT
    • Forensic Computing
    • Malware Analysis
  • Cybersecurity Techniques and Technologies
    • Fundamentals
    • Techinques
    • Technologies
    • Cybersecurity Trends
    • Adversary Behavior
  • Response Teams Management
    • Cybersecurity management
    • Policies
    • Plans
    • Procedures
    • Security Testing and Diagnose
    • Management Duties
  • Nwtwork Attacks and Threats Detection
    • Traffic monitoring
    • Port Scanning
    • Network Attacks
    • Traffic Analysis
    • Precursors
    • Attack Detection

 

 

  • Minimum CPU:
    • Intel Core i5 2.0 GHz+ or equivalent
  • Minimum RAM:
    • 8Gb desirable 16Gb
  • Hard Drive Space:
    • 50 Gb Free
  • Virtualization Software:
    • VmWare Player
    • VmWare Workstation
    • VirtualBox
  • We Provide all the Virtual Machines Needed for this training

 

  • Additional Software
    • PDF Reader
  • In Person In Alexandria, VA
  • Online with real time Intructor
  • Virtual at your own pace
  • Certificate of Attendance
  • Certificate of Proficiency
    • At the end of the training the Student present an Exam to validate the proficiency in all the subjects.
    • The Student have 2 attempts to pass thus exam.

Contact Us

+1 (571) 7211755

2034 Eisenhower Ave # 170 Alexandria, VA 22314

Monday-Friday: 9am - 5pm

Get Started

Schedule a virtual appointment with our experts for a free External Cybersecurity Diagnostic.

ISO 9001 SGS Certificate Icon
ISO 27001 SGS Certificate Icon

Privacy Policy