The Threat Hunting with Google workshop covers the fundamentals of each of the MITRE top ten techniques and top five sub-techniques identified by Mandiant in the annual M-Trends report. The workshop is focused on hands-on exploration of artifact examples and methods for detection, reinforcing learner's practical application of the most used techniques by attackers across MITRE tactics.
Learners are invited into the ThreatSpace range for the practical application of finding artifacts associated with the techniques to uncover threat actor activity. Throughout the course, learners will gain hands-on experience hunting for threat actor activity and will be able to apply these skills in their daily operations. ThreatSpace is an engaging state-of-the-art cyber range using Google Cloud Security tools and a virtualized enterprise within Google Cloud for detecting and responding to threat actor activities. In this delivery, security professionals access a virtual environment that emulates real-world IT infrastructure, including network segments, workstations, servers, and applications. This environment enables the practice of responding to cyber threats in a controlled environment without incurring actual consequences.
The workshop has the following objectives:
The workshop is intended for any information security professional responsible for security operations, incident response, or threat hunting within their organization. The workshop is designed for an audience at the beginner to intermediate level in their professional growth.
In-classroom or virtual instructor-led training
16 hours
A laptop with the latest Chrome browser.
Students will receive electronic versions of all relevant course materials.
Request your copy of the M-Trends 2025 report here.