Threat Hunting with Google covers the fundamentals of each MITRE top ten techniques identified by Mandiant M-Trends report, including artifact examples and methods for detection and engagement.
Learners are invited into the ThreatSpace range for the practical application of finding artifacts associated with the techniques to uncover threat actor activity. Throughout the course, learners will gain hands-on experience hunting for threat actor activity and will be able to apply these skills in their daily operations. ThreatSpace is an engaging state-of-the-art cyber range using Google Cloud Security tools and a virtualized enterprise within Google Cloud for detecting and responding to threat actor activities. In this delivery, security professionals access a virtual environment that simulates real-world IT infrastructure, including network segments, workstations, servers, and applications. This environment enables responding to cyber threats in a controlled environment without incurring actual consequences.
This engagement is intended for individuals with some knowledge in security operations, incident response, analysis, network traffic, security architecture, or system administration duties. This engagement can be delivered virtually, or onsite at customer’s location.
The workshop has the following objectives:
The workshop is intended for any information security professional responsible for security operations, incident response, or threat hunting within their organization. The workshop is designed for an audience at the beginner to intermediate level in their professional growth.
In-classroom or virtual instructor-led training
16 hours
A laptop with the latest Chrome browser.
Students will receive electronic versions of all relevant course materials.
Request your copy of the M-Trends 2025 report here.