logo-img
default image

Cyber Threat Hunting Training

Best price in just 2 steps

Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.

Description

Cyber threat hunting is a proactive, iterative, and human-centered process of finding cyber threats that are inside a network that hasn’t been caught by existing security controls. It is now possible for attackers to stay inside a network for a long time and get information and move around without anyone noticing. It’s at this point that Threat Hunting comes in to help.

Threat hunting is based on the concept of “Assumed Breach “. It helps businesses answer questions like: How do we know when we’ve been breached? What is the evidence we have for this?  And how do we use this information to improve our security?”

Using the knowledge or intelligence gained through Threat Intelligence, threat hunters can hunt down the advisories within the network and locate Indication of compromised (IoC).

Training content in general

  • Introduction to Threat Hunting
  • Threat Hunting Use Cases
  • Hunting for The Indication of Compromise (IoC)
  • Threat Hunting Methods
  • Who Should Attend?

Why this workshop?

  • Sophisticated threats are bypassing both perimeter and endpoint security.
  • Increase the speed and accuracy of incident response
  • Understand and reduce attack surface exposure / hardened network and endpoints.
  • Reduce the time an adversary dwells on the network unnoticed.
  • Detect/prevent the spread of the attack and lateral movement.
  • Collect evidence of compromise.

Learning objectives

At the end of this workshop the participants should be able to:

  • Define Cyber Threat Hunting and explain its value to an organization
  • Understand the Threat Hunting process
  • Know the difference between Cyber Threat Intelligence and Threat Hunting and Incident Response, and they are related and can be used together
  • Learn what data to collect and where to collect it
  • Leverage both endpoint and network data for successful hunting
  • Understand how to hunt for threats in your organization’s systems and network
  • Understand the Hunting Maturity Model to measure your organization’s hunting capability
  • Learn how to find and investigate malware, phishing, lateral movement, data exfiltration, and other common threats

Target group

  • Network security professionals
  • Incident responders.
  • Penetration testers
  • Red team members and other white hats
  • Security analysts
  • Security consultants and auditors
  • Managers wanting to create threat-hunting teams

Prerequisite

  • Basic information security concepts should be understood.
  • A working understanding of networking devices and protocols is required.
  • Exposure to network monitoring and pentesting tools and methodology

 

Grow as a professional in IT, security and privacy.

1

Applicant Information

2

Billing Information

shape
Proudly rated 8.9 by our students

Raymond

22/12/2025

Cisco

CCNA

image not found

Mijn ervaring was zo goed dat ik van plan ben om hierna ook de CCNP‑opleiding te gaan volgen

Maria Brodskaya

08/12/2025

Security Tactisch/Strategisch

CISS{

image not found

Het was heel nuttig

Metehan Ozdemir

08/12/2025

(ISC)2

CISSP

image not found

Alles was goed geregeld en zoals verwacht altijd bij TSTC

Maurits

13/11/2025

Privacy

CIPM

image not found

Goede training, met sterker trainer

Wout

13/11/2025

Security Tactisch/Strategisch

NIS2 Professional (CNIS2)

image not found

heel tevreden

Grow as a professional in IT, security and privacy.

1

Applicant Information

2

Billing Information

Why people choose TSTC to gain their knowledge

Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.

Learn more about TSTC
Toucan Rhino