Cyber Threat Intelligence
Upskilling Course, 40 Academic Hours
Deep Dive: Cyber Threat Intelligence and Threat Hunting Techniques
- Level: Intermediate
This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques.
The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools, threat hunting processes, planning, and tools.
By enrolling in this course, you will be immersing yourself in the dynamic field of Cyber Threat Intelligence, gaining critical skills in identifying, analyzing, and mitigating digital threats
Who Is This Course For?
- Incident responders, analysts and team leaders
- System administrators
- Cyber security practitioners and security architects (TIER 1 and TIER 2 analysts)
- SOC Managers
- STEM Master students
Prerequisites
- Basic cyber security experience
- Understanding of networks and protocols
- Basic knowledge of monitoring and security devices
- IT background
Learning Objectives
- Detect, identify, and contain common cyber security incidents
- Identify suspicious malware activity and malicious code on your endpoints
- Analyze malware with several techniques (static and dynamic)
- Collect intelligence from different sources and tools
- Perform threat hunting and find abnormal behavior
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- 28 hours of practical learning experience through hands-on activities on local environments
- A Wawiwa certificate upon successful completion of the course.
In addition, you may choose to augment your team’s course to include preparation for relevant cybersecurity industry certification tests, at an additional cost. The cybersecurity certifications that this course can be used to prepare for include: GIAC Open Source Intelligence (GOSI), GIAC Certified Enterprise Defender (GCED), and GIAC Cyber Threat Intelligence (GCTI).
Relevant Cybersecurity certifications
Note: An industry certification is neither offered nor guaranteed as part of the course.
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Introduction to CTI (3 Theoretical Hours, 2 Practical Hours)
- Threat Intelligence Lifecycle
- Standards, Tactics, Feeds, and Tools
Introduction to OSINT (3 Theoretical Hours, 2 Practical Hours)
- OSINT Introduction and Sources
- What to Look For – Types of Information and Threats
- Processes and Procedures
- Tools
CTI/OSINT Practice (10 Practical Hours)
- Shodan, Maltego, MISP, and YARA Rules
Introduction to Threat Hunting (4 Theoretical Hours, 8 Practical Hours)
- Definitions of Threat Hunting
- Identifying Goals and Missions
- Understanding the Process Workflow
- Establishing a Threat Hunting Process
Endpoint-Focused Threat Hunting (2 Theoretical Hours, 6 Practical Hours)
- Overview of Threat Hunting in Operating Systems
- Deep Dive into Malware Behaviors
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!