Compare with 1 courses
Threat Hunting

Threat Hunting

Master the art of proactive defense. Learn to identify, track, and neutralize sophisticated cyber threats that bypass traditional security tools before they cause damage.

₦600000

Learn more
Has discount
Expiry period 2 Months
Made in English
Last updated at Thu May 2026
Level
Advanced
Total lectures 0
Total quizzes 0
Total duration 0 Hours
Total enrolment 0
Number of reviews 0
Avg rating
Short description Master the art of proactive defense. Learn to identify, track, and neutralize sophisticated cyber threats that bypass traditional security tools before they cause damage.
Outcomes
  • Develop Hypotheses: Create structured hunting plans based on the latest Threat Intelligence.
  • Analyze Traffic: Detect lateral movement and command-and-control (C2) beacons in network logs.
  • Endpoint Hunting: Use Sysmon and EDR telemetry to identify process injection and living-off-the-land techniques.
  • Automate Detection: Write custom YARA rules and Sigma rules to automate the discovery of known threats.
  • Report Findings: Translate technical "hunts" into actionable business risk reports for stakeholders.
Requirements
  • Foundational Knowledge: Solid understanding of TCP/IP, Windows/Linux internals, and common attack vectors.
  • Prerequisites: Completion of Certified Network Defender or SOC Analyst Tier 1 (or equivalent experience).
  • Environment: Access to a virtualized lab environment (Kali Linux, REMnux, or Windows Server).