Cyber Threat Hunter
Upskilling Course, 40 Academic Hours
Deep Dive: Threat Hunting Methodologies, Tactics and Techniques
- Level: Advanced
Chances are very high that hidden threats already exist inside your organization’s networks. No matter how thorough and sophisticated your security precautions may be, you cannot assume that such security measures are impenetrable. By themselves, prevention systems are insufficient to counter focused human adversaries who know how to get around today’s advanced security and monitoring tools. It takes highly skilled and focused hunters to defeat these persistent adversaries.
Wawiwa’s upskilling course is designed to equip participants with the knowledge and skills to proactively search for and identify cybersecurity threats within their organization’s network. The curriculum covers the fundamentals of threat hunting, including different hunting types, processes, missions and strategies to enhance their maturity. This course also explores specific techniques for endpoint and network-level hunting, such as detecting malware hiding techniques, identifying internal reconnaissance and lateral movement, and effective data acquisition methods.
By enrolling in this course, you'll get advanced knowledge on threat hunting methodologies, tactics, and techniques. You'll familiarize yourself with common threat hunting tools and technologies.
Who Is This Course For?
- IT and Cybersecurity juniors
- Cybersecurity Analysts and Practitioners
- Security Operations (SecOps) professionals
Prerequisites
- Profound knowledge of IT infrastructures
- Advanced knowledge and experience in SOC infrastructure, workflows, processes and Incident Response techniques
Learning Objectives
- Learn the fundamental concepts of cyber threat hunting, including the various types of hunting and how to define hunt missions
- Acquire skills in identifying and mitigating threats at the endpoint level, with a focus on OS technologies, malware detection, and lateral movement prevention
- Gain expertise in hunting for threats within network environments, including understanding tunneling and analyzing suspicious network traffic
- Understand how to expand and mature the scope of threat hunting as a continuous process
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- 27 hours of practical learning experience through hands-on activities
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Module 1: Introduction and Hunting (2 Theoretical Hours, 2 Practical Hours)
- Definitions of Threat Hunting
- Identifying Goals and Missions
- Understanding the Process Workflow
- Establishing a Threat Hunting Process
Module 2: Endpoint-Focused Threat Hunting (4 Theoretical Hours, 8 Practical Hours)
- Overview of Threat Hunting in Operating Systems
- Deep Dive into Malware Behaviors
- Detecting Lateral Movements through Operating Systems
Module 3: Network-Focused Threat Hunting (7 Theoretical Hours, 12 Practical Hours)
- Overview of Threat Hunting in Networks
- Detecting Reconnaissance
- Understanding and Detecting Tunneling (e.g., DNS, ICMP, SSH)
- Detecting Anomalous and Suspicious Traffic (e.g., HTTP, DNS)
Module 4: Summary Exercise (5 Practical Hours)
Practical Exercise for Threat Hunters
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!