We may earn an affiliate commission when you visit our partners.
Course image
Keatron Evans

This course teaches you the necessary skills to becoming a successful threat hunter. As you progress through the modules, you'll build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.

Enroll now

What's inside

Syllabus

Cyber threat hunting introduction
In this introductory module with Keatron Evans, you'll explore cyber threat hunting: defining it, skills required, hunt modeling with hypotheses, implementation benefits and more.
Read more
Threat hunting artifacts and types
In this module, you'll explore what's needed for a really effective threat-hunting program. You'll also learn about artifacts, indicators of compromise, tactics, techniques and procedures, the Pyramid of Pain and many more insights from Keatron.
Threat hunting techniques and generative AI
Explore the concepts of anomalous activity and investigation. The purpose of this module is to help the threat hunter identify whether an anomalous activity is a threat. Explore how to investigate, walking through the information and identifying any issues right away. In this course, Keatron uses generative AI to quickly find malicious activity.
Threat hunting methodologies
In this module, you'll explore the differences between structured and unstructured hunts with Keatron. You will also get into entity-driven hunting.
Threat hunting data and technologies
In this course, Keatron will take you through different data sources that you may hunt through. These include SIEMs, EDR and XDR logs, threat intelligence platforms and several other data sources.
Cyber threat hunting process
In this course, you will learn how to build a hunt. Keatron gets into the details of all the things the learner must consider when building out a hunt and scoping. We also discuss lessons learned and proper execution.
Cyber threat hunting scenarios
In this course, you'll see how different threat hunting scenarios play out. We will use real-world examples to illustrate how we form a hypothesis all the way through lessons learned.
Hunting for network-based threats
In this course, we will go on a deep dive with Keatron concerning network-based threats, including DNS, DDoS and irregular traffic, plus more. This course will include some labs and demonstrations. Locate even the hardest-to-find malware with these techniques.
Hunting for host-based threats
In this course, Keatron will walk through various host-based threats and indicators. There will be labs and demonstrations that include memory forensics, PowerShell and Windows event log parsing.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops threat hunting skills, which are core skills for discovering and mitigating threats
Taught by Keatron Evans, who is recognized for his work in threat hunting
Covers a wide range of threat hunting topics, including threat intelligence, investigation techniques, and remediation methods
Provides hands-on experience with threat hunting tools and techniques
Requires extensive background knowledge in IT and security
Assumes familiarity with threat hunting concepts and terminology

Save this course

Save Cyber Threat Hunting to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cyber Threat Hunting with these activities:
Review core networking concepts
Strengthens your foundational networking knowledge, ensuring a solid base for understanding and analyzing network-based threats.
Browse courses on Networking Fundamentals
Show steps
  • Review the OSI model and its layers.
  • Study common network protocols, including TCP/IP, UDP, and DNS.
  • Explore basic network security concepts, such as firewalls, intrusion detection, and prevention.
Review essential cybersecurity concepts
Build a strong foundation by revisiting key concepts before starting the course.
Browse courses on Security
Show steps
  • Review basic network concepts
  • Refresh your understanding of cyber threats
Read 'The Art of Deception: Controlling the Human Element of Security'
Gain insights into social engineering techniques and human vulnerabilities, crucial for understanding attacker methodologies and developing effective countermeasures.
Show steps
  • Study the principles of social engineering and how attackers exploit human weaknesses.
  • Identify common social engineering tactics and techniques.
  • Develop strategies to mitigate social engineering attacks and protect against human-based threats.
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Review network security fundamentals
Refreshes foundational network security knowledge, equipping you with a robust understanding before delving into advanced threat hunting concepts.
Browse courses on network security
Show steps
  • Revise concepts of network topology, IP addressing, and subnetting.
  • Review common network protocols, including TCP/IP, UDP, and DNS.
  • Explore fundamental network security principles, such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).
Connect with experienced threat hunters
Gain valuable guidance and insights from industry professionals.
Show steps
  • Attend industry events or online forums
  • Reach out to professionals via LinkedIn or email
Follow tutorials on threat intelligence platforms
Strengthens your understanding of threat intelligence sources and tools, enabling you to gather and analyze valuable information for threat hunting.
Browse courses on Threat Intelligence
Show steps
  • Explore online resources and tutorials from vendors such as Mandiant, FireEye, and Recorded Future.
  • Sign up for free trials or demos to gain hands-on experience with threat intelligence platforms.
  • Practice using threat intelligence feeds to identify and track malicious actors and campaigns.
Hunt for malicious activity using network traffic analysis
Sharpens your ability to identify and analyze suspicious network activity, enhancing your threat detection capabilities.
Browse courses on Network Traffic Analysis
Show steps
  • Use Wireshark or other network packet analysis tools to capture and inspect network traffic.
  • Identify patterns and anomalies in network traffic that may indicate malicious activity.
  • Correlate network traffic data with other security logs and data sources to identify potential threats.
Participate in online discussion forums on threat hunting
Connects you with a community of threat hunters, enabling you to share knowledge, learn from others, and stay up-to-date on industry best practices.
Show steps
  • Join online forums dedicated to threat hunting, such as the SANS DFIR Forum or the Threat Hunting Discord server.
  • Participate in discussions, ask questions, and share your experiences.
  • Network with other threat hunters to expand your professional network.
Solve cybersecurity puzzles and challenges
Enhance your analytical skills and test your knowledge in real-life scenarios.
Browse courses on Threat Hunting
Show steps
  • Participate in online CTFs (Capture the Flag) events
  • Solve puzzles or challenges provided by cybersecurity blogs
Develop a threat hunting playbook
Provides you with a valuable resource to guide your threat hunting process, ensuring consistency and efficiency in responding to potential threats.
Browse courses on Incident Response
Show steps
  • Identify the specific threats and scenarios your organization is most vulnerable to.
  • Define the steps and procedures for threat detection, investigation, and remediation.
  • Test and refine your playbook through simulations or tabletop exercises.
  • Regularly update and iterate the playbook based on lessons learned and new threat intelligence.
Contribute to open-source threat hunting tools
Enhances your technical skills, exposes you to cutting-edge tools, and contributes to the broader threat hunting community.
Browse courses on Security Tools
Show steps
  • Identify open-source threat hunting projects that align with your interests.
  • Review the project's documentation and contribute bug reports or feature requests.
  • Develop or improve upon existing threat hunting tools, and submit your contributions for review.

Career center

Learners who complete Cyber Threat Hunting will develop knowledge and skills that may be useful to these careers:
Threat Hunter
Threat Hunters are responsible for proactively identifying and hunting for threats to an organization's security. They use a variety of techniques to identify and track threats, and they work to prevent those threats from causing damage. If you want to build a career in cybersecurity, then the Cyber Threat Hunting course is a great resume booster. This course may help you develop the skills you need to become a successful Threat Hunter.
Penetration Tester
Penetration Testers are ethical hackers who are hired to test the security of an organization's computer systems and networks. They work to identify and exploit vulnerabilities before they can be exploited by malicious actors. If you want to build a career in penetration testing, then the Cyber Threat Hunting course is a great place to start. This course will teach you the skills and techniques you need to become a successful Penetration Tester.
Threat Analyst
Threat Analysts are responsible for identifying and assessing threats to an organization's security. They collect and analyze information about potential threats, and they develop and implement strategies to mitigate those threats. If you want to build a career in intelligence and risk management, then consider taking the Cyber Threat Hunting course.
SOC Analyst
Security Operations Center (SOC) Analysts are responsible for monitoring and analyzing security events and incidents. They investigate security alerts, respond to security incidents, and work to prevent future security breaches. If you want to build a career working in a fast-paced environment, monitoring and analyzing security events and incidents, then you should consider the Cyber Threat Hunting course.
Incident Responder
Incident Responders play a critical role in minimizing the damage caused by cyberattacks. An Incident Responder must establish incident response protocols and procedures. They work to contain the damage, restore normal operations, and provide guidance to other teams throughout the incident. If you want to build a career working on the frontlines of network security, helping organizations to respond to and recover from cyberattacks, then you should consider the Cyber Threat Hunting course.
Cloud Security Architect
Cloud Security Architects design, implement, and maintain the security of cloud computing environments. They work to protect cloud-based applications and data from unauthorized access, data breaches, and other threats. If you want to build a career in cloud security, the Cyber Threat Hunting course is a resume booster. It will prepare you with the skills and knowledge to keep your cloud environments secure.
Network Security Engineer
Network security engineers are responsible for designing, implementing, and maintaining the security of an organization's computer networks. They work to protect networks from unauthorized access, denial of service attacks, and other threats. If you want to work in network security, consider the Cyber Threat Hunting course. This course will prepare you with the skills needed to identify and mitigate threats to network security.
Forensic Investigator
Forensic Investigators collect, analyze, and interpret digital evidence to investigate cybercrimes. They work to identify and apprehend cybercriminals and to prevent future cyberattacks. If you want to build a career in digital forensics, consider the Cyber Threat Hunting course. This course may help you develop the skills you need to become a successful Forensic Investigator.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in an organization's computer systems and networks. They work to identify and fix vulnerabilities before they can be exploited by attackers. If you want to build a career in cybersecurity, then consider taking the Cyber Threat Hunting course. This course can help you build a foundation in vulnerability assessment and management.
Security Engineer
Security Engineers are responsible for the security of an organization's computer systems and networks. They install, maintain, and monitor security systems, and they respond to security incidents. If you want to build a career in designing, implementing, and maintaining secure computer systems and networks, then consider taking the Cyber Threat Hunting course.
Cybersecurity Manager
Cybersecurity Managers are responsible for the overall security of an organization's information systems and data. They work to develop and implement security policies and procedures, and they oversee the organization's cybersecurity team. If you want to build a career in cybersecurity management, then consider taking the Cyber Threat Hunting course. This course will help you build a foundation in cybersecurity management and leadership.
Security Architect
Security Architects are in charge of making sure the right security measures are in place to protect the company they work for. They are responsible for ensuring that information is properly protected and that security measures are in place to protect from data breaches. If you wish to create a career in helping organizations design, build, and maintain secure IT systems and networks, then consider the Cyber Threat Hunting course.
Cyber Risk Analyst
Cyber Risk Analysts assess the risks to an organization's information systems and data. They work to identify, analyze, and mitigate these risks. If you want to build a career in cyber risk management, then consider taking the Cyber Threat Hunting course. This course will help you build a foundation in cyber risk assessment and management.
Information Security Analyst
An Information Security Analyst is capable of ensuring that a company's cybersecurity infrastructure is properly in place and constantly being improved upon. They must be skilled in looking for and managing risks, as well as ensuring the company's computer networks and systems are secure. If you want to build a career keeping information safe from unauthorized access, use, disclosure, disruption, modification, or destruction, then the Cyber Threat Hunting course may help get you started.
Cybersecurity Analyst
Cybersecurity Analysts can defend and direct a team to defend against cyberattacks, and the need for these cybersecurity measures is only increasing. Organizations big and small need Cybersecurity Analysts who can monitor and analyze computer networks, systems, and applications for threats and vulnerabilities. If you wish to create a career in building a safe and secure network for organizations and individuals, Cybersecurity Threat Hunting is a course that may be useful.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Threat Hunting.
Provides a deep dive into memory forensics, including how to acquire and analyze memory dumps, how to identify and extract evidence of malware and threats, and how to use memory forensics to investigate and respond to cyber attacks.
Provides a practical guide to network security monitoring, covering techniques for detecting and responding to security incidents.
Provides a comprehensive guide to cloud security, including how to design and implement cloud security solutions, how to secure cloud services, and how to monitor and manage cloud security.
Provides a comprehensive overview of security threats and vulnerabilities, covering topics such as network security, cryptography, and malware analysis.
Provides a comprehensive guide to cybersecurity, including how to protect yourself from cyber threats, how to secure your devices and networks, and how to stay safe online.
Introduces threat modeling as a key aspect of secure system design, providing a practical approach to identifying and mitigating threats to systems and applications.
Explores the human aspect of cybersecurity, providing insights into how attackers use social engineering and other techniques to compromise systems and providing practical advice on how to counter these threats.
Covers the fundamentals of network security assessments, providing a practical approach to identifying and mitigating vulnerabilities in network infrastructure.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cyber Threat Hunting.
Threat Hunting: Review, Automate, and Improve
Most relevant
Threat Hunt with PowerShell
Most relevant
Advanced Threat Hunting and Incident Response
Most relevant
Threat Hunting: Hypothesize and Plan
Most relevant
Specialized Hunts: Threat Hunting within Mail Servers
Threat Investigation
Utilizing Zeek 4 in an Enterprise Environment or for...
Threat Hunt with IBM Security QRadar
Specialized Hunts: Threat Hunting within Active Directory
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser