Instructor-led training course
The Practical Threat Hunting course has been designed to teach threat hunters and incident responders the core concepts of developing and executing threat hunts. Through this course students can learn to:
This course includes practical labs that challenge the students to develop hypotheses and hunt missions in order to hunt for evidence of compromise through multiple scenarios including social engineering, network and system compromise, and APT nation-state actors. The labs are designed so that students have an opportunity to experience hunting using environments like the command line, Jupyter Notebook, and forensic tools like Velociraptor.
Prerequisites: Students should possess knowledge of computer and operating system fundamentals. Python programming is not required; however, familiarity with the language or programming concepts will help students when working on some of the labs.
The course is comprised of the following modules, with labs included through the instruction.
The content and pace of this course is intended for threat hunters, information security professionals, incident responders, computer security researchers, corporate investigators, or others requiring an understanding of how threat hunting is performed, and the processes involved in performing threat hunts.
In-classroom and virtual instructor-led training
Students should bring their own laptop computer with the latest browser of choice and the ability to connect to the Internet. Students will receive class handouts, temporary credentials to get access to Mandiant Advantage, and directions on how to connect to the lab environment.