HRDC Reg. No: Threat Hunting
Duration: 4 Days (32 Hours)
Level: Advanced
Course Overview
The Threat Hunting course is designed for cybersecurity professionals to proactively detect, investigate, and mitigate cyber threats. This hands-on training covers live machine and memory analysis, Windows exploitation techniques, Active Directory attack investigations, and endpoint threat hunting using industry-standard SOC tools like Volatility, Sysmon, Splunk, and ELK.
Participants will engage in real-world case studies, live simulations, and hands-on labs to strengthen investigative skills, analyze adversarial tactics, and implement detection mechanisms.
Who Should Attend?
Cybersecurity Analysts & SOC Teams – Detect and respond to advanced persistent threats (APT).
Threat Hunters & Incident Responders – Investigate and contain active cyber threats.
Digital Forensics Professionals – Perform memory forensics and malware analysis.
System Administrators & Security Engineers – Improve defensive security postures.
Why Choose This Course?
HRDC Claimable (Check with HRDC for eligibility).
Covers advanced threat hunting methodologies, tools, and attack detection techniques.
Hands-on malware analysis, memory forensics, and Active Directory attack investigations.
Learn how to use Sysmon, Splunk, ELK, and Cuckoo Sandbox for threat detection.
Pre-requisites
Basic understanding of cybersecurity fundamentals.
Familiarity with Windows OS internals.
Basic knowledge of incident response and forensic analysis.
Experience with command-line tools (PowerShell, CMD, Linux shell) is recommended.
No prior threat hunting experience required, but security analysis knowledge is beneficial.