Cyber-threat Intelligence and Hunting for Cybersecurity
Learn the basics of Cyber Threat Intelligence (CTI) and Cyber Threat Hunting (CTH) with our intensive course. How to identify, analyze, and neutralize APT effectively.
This hands-on training equips cybersecurity professionals with the skills to detect, analyze, and hunt cyber threats. Using real-world scenarios, participants will work with threat intelligence frameworks, IOCs, malware analysis, and network traffic investigations to track adversaries and mitigate attacks.
Key Topics:
✔ Threat Intelligence Fundamentals – Types, cycles, and intelligence feeds.
✔ MITRE ATT&CK & APT Profiling – Mapping adversary TTPs and attack lifecycles.
✔ IOC & Malware Analysis – Extracting hashes, network indicators, and behavioral patterns.
✔ Threat Hunting Techniques – Investigating malicious infrastructure and analyzing network traffic.
✔ Building Actionable Reports – Creating intelligence-driven reports for security operations.
Ideal for SOC analysts, threat hunters, and incident responders, this course includes hands-on labs and a 1-year access to materials and community resources.
Introduction
Types of Intelligence Part I
Types of Intelligence Part II
Use Cases Graphic
Intelligence Cycle and Hands-On exercise working with Hashes
Hands-On exercises working with IOC
Hands-On exercise working with Malware
APT's and Threat Profiling
IOCs
Threat Data Feeds Part I
Threat Data Feeds Part II
The Pyramid of Pain
MITRE ATT&CK® Framework
MISP Part I
MISP Part II
Threat Hunting
Creating Threat Hunting Rules
Tracking Malicious Infrastructure in Real Time
Threat Hunting: Analyzing Traffic Part I
Threat Hunting: Analyzing Traffic Part II
Threat Hunting: Analyzing Traffic Part II
Building The Final Report
Commands used on the Hands-On Traffic Analysis
Final Report
These tools will enhance your ability to work effectively with the course materials and practical exercises.
If you want to become an expert on Nmap then this is the right course for you. Smouk teaches you how to use this powerful tool.
$49
Embark on an intensive journey into the heart of cybersecurity infrastructure with our course. In today's digital battleground, infrastructure vulnerabilities are a hacker's goldmine. Don't miss this opportunity!
$99
Stay at the forefront of the cybersecurity field by enrolling in Advanced SCADA Hacking and Security training! This training will equip you with the tools and insights needed to address the unique cybersecurity needs of SCADA/ICS systems.
$299