https://www.enoinstitute.com/training-tutorials-courses/cyber-threat-hunting-training-ccthp/ Learn how to find, assess, and remove threats from your organization in our Certified Cyber Threat Hunting Training (CCTHP) designed to prepare you for the Certified Cyber Threat Hunting Professional (CCTHP) exam.
In this Cyber Threat Hunting Training (CCTHP) course, we will deep dive into “Threat hunting” and searching for threats and mitigate before the bad guy pounce. And we will craft a series of attacks to check Enterprise security level and hunt for threats. An efficient Threat hunting approach towards Network, Web, Cloud, IoT Devices, Command & Control Channel(c2), Web shell, memory, OS, which will help you to gain a new level of knowledge and carry out all tasks with complete hands-on.
RESOURCES:
Cyber Threat Hunting Training: Cyber Threat Hunting A Complete Guide – 2020 Edition By Gerardus Blokdyk/vitalsource.com
Cyber Threat Hunting Training: Cyber Threat Hunting A Complete Guide – 2019 Edition By: Gerardus Blokdyk/vitalsource.com
Cyber Threat Hunting Training: Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques 1st Edition by Vinny Troia/Amazon.com
Cyber Threat Hunting Training: Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer by Muniz Joseph and Lakhani Aamir/Amazon.com
CUSTOMIZE It:
We can adapt this Cyber Threat Hunting Training (CCTHP) course to your group’s background and work requirements at little to no added cost.
If you are familiar with some aspects of this Cyber Threat Hunting (CCTHP) course, we can omit or shorten their discussion.
We can adjust the emphasis placed on the various topics or build the Cyber Threat Hunting Training (CCTHP) around the mix of technologies of interest to you (including technologies other than those included in this outline).
If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Cyber Threat Hunting Training (CCTHP) course in manner understandable to lay audiences.
1. E N O I N S T I T U T E . C O M
.69
30
IMAGINETOMORROW!LEARNTODAY!
CCTHP
L E A R N M O R E !
Learn how to find, assess and
remove threats from your
organization in our Certified
Cyber Threat Hunting Training
(CCTHP) designed to prepare
you for the Certified Cyber
Threat Hunting Professional
(CCTHP) exam.
In this Cyber Threat Hunting
Training (CCTHP) course, we will
deep dive into “Threat hunting”
and searching for threats and
mitigate before the bad guy
pounce
Cyber Threat
Hunting Training
Seminar
2. W W W . E N O I N S T I T U T E . C O M
CCTHP WHO WE ARE
ENO Institute, a worldwide leader in corporate blended learning
solutions, has assembled a full complement of products and services to
help you align corporate knowledge with business objectives. A pioneer
in learning, ENO Institute has maintained a steadfast focus on
developing a robust and highly acclaimed catalog of IT, desktop and
professional development courses — including an MBA program!
Our courses are derived from 25 years of first-hand technology
experience and industry best practices. Our classes are customized to
your team’s requirements and taught at your offices, Virtual Classroom
and Online by world-class instructors with publications, patents,
awards/honors, and a passion to share knowledge!
M O B I L E F R I E N D L Y
The power of real-time, interactive Virtual Classrooms has now become
an integral part of our Learning environment whether through, laptops,
PC, tablets, and smartphones! ENO Institute Virtual Classrooms can
enhance the fast, easy sharing of information on the Internet using our
data integration, audio, and video capabilities through a standard web
browser — resulting in more comprehensive, flexible, and dynamic
communications.
3. W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE IN THE NUTSHELL
Learn how to find, assess and remove threats from your organization in
our Certified Cyber Threat Hunting Training (CCTHP) designed to
prepare you for the Certified Cyber Threat Hunting Professional (CCTHP)
exam.
In this Cyber Threat Hunting Training (CCTHP) course, we will deep dive
into “Threat hunting” and searching for threats and mitigate before the
bad guy pounce. And we will craft a series of attacks to check Enterprise
security level and hunt for threats. An efficient Threat hunting approach
towards Network, Web, Cloud, IoT Devices, Command & Control
Channel(c2), Web shell, memory, OS, which will help you to gain a new
level of knowledge and carry out all tasks with complete hands-on.
This Cyber Threat Hunting Training (CCTHP) course focuses on capturing
the adversary’s ability to compromise a network, conduct lateral
movement, establish command and control, tunnel, and exfiltrate data.
Students identify covert communications, malicious activity, and other
network data anomalies. Instructors use various open source and
custom-developed remote interrogation techniques to analyze
networking devices and supporting systems to include logging and
alerts. Instructors present students with real-world situations and
enable them to perform HUNT operations across a corporate network.
4. W W W . E N O I N S T I T U T E . C O M
CCTHP CERTIFICATION DETAILS
The Certified Cyber Threat Hunting Professional (CCTHP) certification is
designed to certify that candidates have expert-level knowledge and
skills in cyber threat identification and threat hunting.
The CCTHP body of knowledge consists of five domains covering the
responsibilities of a cyber threat hunter. The certification exam is a 50-
question, traditional multiple-choice test. Questions are randomly
pulled from a master list and must be completed in two hours. The five
CCTHP domains are:
Cyber threat hunting definition and goals
Cyber threat hunting methodologies and techniques
Hunting for network-based cyber threats
Hunting for host-based cyber threats
Cyber threat hunting technologies and tools
S T U D E N T S M A T E R I A L S
Three days of expert Certified Cyber Threat Hunting Training
(CCTHP) with an expert instructor
Certified Cyber Threat Hunting Professional (CCTHP) Training Guide
1 exam voucher
100% Satisfaction Guarantee
Exam Pass Guarantee
5. W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE OBJECTIVES
After attending the Cyber Threat Hunting Training, you will have the
knowledge and skills to:
Think tactically regarding cyber threat defense
Use threat intelligence to form your own hypotheses and begin the
hunt
Anticipate and hunt down threats in your organization’s systems
Inspect network information to identify dangerous traffic
Understand the Hunting Maturity Model to measure your
organization’s hunting capability
Learn how to find and investigate malware, phishing, lateral
movement, data exfiltration and other common threats
C U S T O M I Z E I t
We can adapt this Cyber Threat Hunting Training (CCTHP) course to
your group’s background and work requirements at little to no
added cost.
If you are familiar with some aspects of this Cyber Threat Hunting
(CCTHP) course, we can omit or shorten their discussion.
We can adjust the emphasis placed on the various topics or build
the Cyber Threat Hunting Training (CCTHP) around the mix of
technologies of interest to you (including technologies other than
those included in this outline).
6. W W W . E N O I N S T I T U T E . C O M
CCTHP AUDIENCE/TARGET GROUP
Understanding the process of threat hunting is useful to any number of
different jobs and teams. Our Cyber Threat Hunting Training would be
perfect for anyone who wants to know more about threat hunting and
the current threat landscape, such as:
Penetration testers
Red team members and other white hats
Incident-response team members
Security analysts
Engineers specializing in network security or IT
Security consultants and auditors
Managers wanting to create threat-hunting teams within their own
companies
C O U R S E P R E R E Q U I S I T E S
The knowledge and skills that a learner must have before attending this
Cyber Threat Hunting Training (CCTHP) course are:
Understanding of fundamental information security concepts
Working knowledge of networking devices and protocols
Exposure to pentesting and network monitoring tools and
methodologies
Basic knowledge of Linux and Windows command line
7. W W W . E N O I N S T I T U T E . C O M
CCTHP
COURSE SYLLABUS
DAY 1
Introduction to cyber threat hunting
What is threat hunting?
Assumption of breach
The concept of active defense
Role of threat hunting in organizational security program
Threat hunting benefits
Threat hunting process
Preparing for the hunt: the hunter, the data, the tools
Creating a context-based hypothesis
Starting the hunt (confirming the hypothesis)
Responding to the attack
Lessons learned
Threat hunting methodologies
The Crown Jewel Analysis (CJA)
Cyber threat patterns and signatures
Utilizing threat intelligence
Threat hunting hypotheses: intelligence-driven, awareness-driven,
analytics-driven
8. W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 2
Threat hunting techniques
Searching
Cluster analysis
Grouping
Stack counting
Preparing for the hunt
What data do you need and how to get it?
Host and network visibility
Data gathering and analysis tools
Commercial and open-source threat hunting solutions
The hunt is on
What threats can be hunted?
Introduction to IOCs and artifacts
IOCs and IOAs
Cyber kill chain
Hunting for network-based threats
9. W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 2 (Cont.)
Hunting for network-based threats
Network hunting overview (networking concepts, devices and
communications, hunting tools)
Hunting for suspicious DNS requests and geographic abnormalities
Hunting for DDoS Activity
Hunting for suspicious domains, URLs and HTML responses
Hunting for irregular traffic: misused protocols,
port-application mismatches, web shells and other threats
Hunting for host-based threats
Endpoint hunting overview (Windows and Linux processes, file
systems, registry, hunting tools)
Malware (types, common activities, AV evasion, detection and
analysis tools and methods)
Hunting for irregularities in processes
Hunting for registry and system file changes
Hunting for filenames and hashes
Hunting for abnormal account activity (brute-force attacks,
privileged accounts)
Hunting for swells in database read volume
Hunting for unexpected patching of systems
10. W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 3
Utilizing system and security event data
Event logs and IDs
Logging on Windows and Linux
SIEM
Using event data during hunts
Advanced threat hunting concepts
OODA (Observe, Orient, Decide, Act) loop
Going beyond IOCs: hunting for advanced threats
Chokepoint monitoring
Deceptive technologies
Developing an effective threat-hunting program
Building customized threat-hunting tools
Threat hunting best practices and resources
11. W W W . E N O I N S T I T U T E . C O M
CCTHP CONTACT OUR TRAINING EXPERTS
S TA F F O R D , V I R G I N I A :
59 Tech Pkwy Stafford, Virginia 22556
Tel: 540.720.9660
Fax: 540.720.9664
TOLL: 888.742.3214
I N T E R N A T I O N A L :
Tel: 540.720.9661
Fax: 540.720.9664
V I S I T E N O I N S T I T U T E W E B S I T E
https://www.enoinstitute.com/
https://www.enoinstitute.com/training-tutorials-courses/cyber-
threat-hunting-training-ccthp/
T A K E T H I S C O U R S E