Course description

This course is a foundation course that provides students the tools and knowledge to effectively hunt down possible security threats across a network. In this course, students will learn how to adapt to cutting-edge threat hunting practices in your own working environment. The course will equip students with knowledge and practice of current threat hunting strategies, so you can pick the right strategy for various types of applicable threats. Students will be trained to discover, identify, categorize, and analyse threats. Combined with the various cyber security courses that focus on defence, this course completes an organization’s command of threats.

Course content

  • Introduction to Cyber threat hunting
  • The process of Threat Hunting
  • Common methodologies used for Threat Hunting
  • Introduction to Threat Intelligence
  • Application of Threat Intelligence
  • Techniques used for Threating Hunting
  • Automation & Tools Used in a Threat Hunting Program
  • Threat Hunting Preparations
  • Network Based Threat Hunting
  • Host Based Threat Hunting
  • A Hunt’s Lifecycle
  • Application of Security Event & System Data for Hunts
  • The Process of Incident Response

Course Objectives

  • Developing a proactive mindset for data security against threats
  • Developing threat hunting skills to protect sophisticated organizational networks
  • Developing the skill to appropriately apply threat intelligence/hypotheses to locate threats
  • Developing the skill to examine traffic on the network and filter malicious items
  • Learning how to execute thorough memory analyses with the help of Volatility and Redline for malware

Target audience

  • Cyber Threat Specialist
  • Security Consultant
  • Penetration Testers
  • Technical Business Analysis
  • Technical Project Manager
  • Incident Response Team Member

Location / Delivery

  • Online

Start date

  • April 6, 2020


  • 2 hours per day across seven days


  • £425.00 £850.00