SlideShare une entreprise Scribd logo
1  sur  11
E N O I N S T I T U T E . C O M
.69
30
IMAGINETOMORROW!LEARNTODAY!
CCTHP
L E A R N M O R E !
Learn how to find, assess and
remove threats from your
organization in our Certified
Cyber Threat Hunting Training
(CCTHP) designed to prepare
you for the Certified Cyber
Threat Hunting Professional
(CCTHP) exam.
In this Cyber Threat Hunting
Training (CCTHP) course, we will
deep dive into “Threat hunting”
and searching for threats and
mitigate before the bad guy
pounce
Cyber Threat
Hunting Training
Seminar
W W W . E N O I N S T I T U T E . C O M
CCTHP WHO WE ARE
ENO Institute, a worldwide leader in corporate blended learning
solutions, has assembled a full complement of products and services to
help you align corporate knowledge with business objectives. A pioneer
in learning, ENO Institute has maintained a steadfast focus on
developing a robust and highly acclaimed catalog of IT, desktop and
professional development courses — including an MBA program!
Our courses are derived from 25 years of first-hand technology
experience and industry best practices. Our classes are customized to
your team’s requirements and taught at your offices, Virtual Classroom
and Online by world-class instructors with publications, patents,
awards/honors, and a passion to share knowledge!
M O B I L E F R I E N D L Y
The power of real-time, interactive Virtual Classrooms has now become
an integral part of our Learning environment whether through, laptops,
PC, tablets, and smartphones! ENO Institute Virtual Classrooms can
enhance the fast, easy sharing of information on the Internet using our
data integration, audio, and video capabilities through a standard web
browser — resulting in more comprehensive, flexible, and dynamic
communications.
W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE IN THE NUTSHELL
Learn how to find, assess and remove threats from your organization in
our Certified Cyber Threat Hunting Training (CCTHP) designed to
prepare you for the Certified Cyber Threat Hunting Professional (CCTHP)
exam.
In this Cyber Threat Hunting Training (CCTHP) course, we will deep dive
into “Threat hunting” and searching for threats and mitigate before the
bad guy pounce. And we will craft a series of attacks to check Enterprise
security level and hunt for threats. An efficient Threat hunting approach
towards Network, Web, Cloud, IoT Devices, Command & Control
Channel(c2), Web shell, memory, OS, which will help you to gain a new
level of knowledge and carry out all tasks with complete hands-on.
This Cyber Threat Hunting Training (CCTHP) course focuses on capturing
the adversary’s ability to compromise a network, conduct lateral
movement, establish command and control, tunnel, and exfiltrate data.
Students identify covert communications, malicious activity, and other
network data anomalies. Instructors use various open source and
custom-developed remote interrogation techniques to analyze
networking devices and supporting systems to include logging and
alerts. Instructors present students with real-world situations and
enable them to perform HUNT operations across a corporate network.
W W W . E N O I N S T I T U T E . C O M
CCTHP CERTIFICATION DETAILS
The Certified Cyber Threat Hunting Professional (CCTHP) certification is
designed to certify that candidates have expert-level knowledge and
skills in cyber threat identification and threat hunting.
The CCTHP body of knowledge consists of five domains covering the
responsibilities of a cyber threat hunter. The certification exam is a 50-
question, traditional multiple-choice test. Questions are randomly
pulled from a master list and must be completed in two hours. The five
CCTHP domains are:
 Cyber threat hunting definition and goals
 Cyber threat hunting methodologies and techniques
 Hunting for network-based cyber threats
 Hunting for host-based cyber threats
 Cyber threat hunting technologies and tools
S T U D E N T S M A T E R I A L S
 Three days of expert Certified Cyber Threat Hunting Training
(CCTHP) with an expert instructor
 Certified Cyber Threat Hunting Professional (CCTHP) Training Guide
 1 exam voucher
 100% Satisfaction Guarantee
 Exam Pass Guarantee
W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE OBJECTIVES
After attending the Cyber Threat Hunting Training, you will have the
knowledge and skills to:
 Think tactically regarding cyber threat defense
 Use threat intelligence to form your own hypotheses and begin the
hunt
 Anticipate and hunt down threats in your organization’s systems
 Inspect network information to identify dangerous traffic
 Understand the Hunting Maturity Model to measure your
organization’s hunting capability
 Learn how to find and investigate malware, phishing, lateral
movement, data exfiltration and other common threats
C U S T O M I Z E I t
 We can adapt this Cyber Threat Hunting Training (CCTHP) course to
your group’s background and work requirements at little to no
added cost.
 If you are familiar with some aspects of this Cyber Threat Hunting
(CCTHP) course, we can omit or shorten their discussion.
 We can adjust the emphasis placed on the various topics or build
the Cyber Threat Hunting Training (CCTHP) around the mix of
technologies of interest to you (including technologies other than
those included in this outline).
W W W . E N O I N S T I T U T E . C O M
CCTHP AUDIENCE/TARGET GROUP
Understanding the process of threat hunting is useful to any number of
different jobs and teams. Our Cyber Threat Hunting Training would be
perfect for anyone who wants to know more about threat hunting and
the current threat landscape, such as:
 Penetration testers
 Red team members and other white hats
 Incident-response team members
 Security analysts
 Engineers specializing in network security or IT
 Security consultants and auditors
 Managers wanting to create threat-hunting teams within their own
companies
C O U R S E P R E R E Q U I S I T E S
The knowledge and skills that a learner must have before attending this
Cyber Threat Hunting Training (CCTHP) course are:
 Understanding of fundamental information security concepts
 Working knowledge of networking devices and protocols
 Exposure to pentesting and network monitoring tools and
methodologies
 Basic knowledge of Linux and Windows command line
W W W . E N O I N S T I T U T E . C O M
CCTHP
COURSE SYLLABUS
DAY 1
Introduction to cyber threat hunting
 What is threat hunting?
 Assumption of breach
 The concept of active defense
 Role of threat hunting in organizational security program
 Threat hunting benefits
Threat hunting process
 Preparing for the hunt: the hunter, the data, the tools
 Creating a context-based hypothesis
 Starting the hunt (confirming the hypothesis)
 Responding to the attack
 Lessons learned
Threat hunting methodologies
 The Crown Jewel Analysis (CJA)
 Cyber threat patterns and signatures
 Utilizing threat intelligence
 Threat hunting hypotheses: intelligence-driven, awareness-driven,
analytics-driven
W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 2
Threat hunting techniques
 Searching
 Cluster analysis
 Grouping
 Stack counting
Preparing for the hunt
 What data do you need and how to get it?
 Host and network visibility
 Data gathering and analysis tools
 Commercial and open-source threat hunting solutions
The hunt is on
 What threats can be hunted?
 Introduction to IOCs and artifacts
 IOCs and IOAs
 Cyber kill chain
 Hunting for network-based threats
W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 2 (Cont.)
Hunting for network-based threats
 Network hunting overview (networking concepts, devices and
communications, hunting tools)
 Hunting for suspicious DNS requests and geographic abnormalities
 Hunting for DDoS Activity
 Hunting for suspicious domains, URLs and HTML responses
 Hunting for irregular traffic: misused protocols,
 port-application mismatches, web shells and other threats
Hunting for host-based threats
 Endpoint hunting overview (Windows and Linux processes, file
systems, registry, hunting tools)
 Malware (types, common activities, AV evasion, detection and
analysis tools and methods)
 Hunting for irregularities in processes
 Hunting for registry and system file changes
 Hunting for filenames and hashes
 Hunting for abnormal account activity (brute-force attacks,
privileged accounts)
 Hunting for swells in database read volume
 Hunting for unexpected patching of systems
W W W . E N O I N S T I T U T E . C O M
CCTHP COURSE SYLLABUS
DAY 3
Utilizing system and security event data
 Event logs and IDs
 Logging on Windows and Linux
 SIEM
 Using event data during hunts
Advanced threat hunting concepts
 OODA (Observe, Orient, Decide, Act) loop
 Going beyond IOCs: hunting for advanced threats
 Chokepoint monitoring
 Deceptive technologies
 Developing an effective threat-hunting program
 Building customized threat-hunting tools
 Threat hunting best practices and resources
W W W . E N O I N S T I T U T E . C O M
CCTHP CONTACT OUR TRAINING EXPERTS
S TA F F O R D , V I R G I N I A :
59 Tech Pkwy Stafford, Virginia 22556
Tel: 540.720.9660
Fax: 540.720.9664
TOLL: 888.742.3214
I N T E R N A T I O N A L :
Tel: 540.720.9661
Fax: 540.720.9664
V I S I T E N O I N S T I T U T E W E B S I T E
https://www.enoinstitute.com/
https://www.enoinstitute.com/training-tutorials-courses/cyber-
threat-hunting-training-ccthp/
T A K E T H I S C O U R S E

Contenu connexe

Tendances

Adversary Emulation Workshop
Adversary Emulation WorkshopAdversary Emulation Workshop
Adversary Emulation Workshopprithaaash
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for BeginnersSKMohamedKasim
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Christopher Korban
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEJorge Orchilles
 
Misp(malware information sharing platform)
Misp(malware information sharing platform)Misp(malware information sharing platform)
Misp(malware information sharing platform)Nadim Kadiwala
 

Tendances (20)

Adversary Emulation Workshop
Adversary Emulation WorkshopAdversary Emulation Workshop
Adversary Emulation Workshop
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
Misp(malware information sharing platform)
Misp(malware information sharing platform)Misp(malware information sharing platform)
Misp(malware information sharing platform)
 

Similaire à Cyber Threat Hunting Training (CCTHP)

Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystShivamSharma909
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfinfosecTrain
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇Infosec train
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠priyanshamadhwal2
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfinfosec train
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHInfosecTrain Education
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0James Perry, Jr.
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyE Hacking
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 

Similaire à Cyber Threat Hunting Training (CCTHP) (20)

Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 

Dernier

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Dernier (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Cyber Threat Hunting Training (CCTHP)

  • 1. E N O I N S T I T U T E . C O M .69 30 IMAGINETOMORROW!LEARNTODAY! CCTHP L E A R N M O R E ! Learn how to find, assess and remove threats from your organization in our Certified Cyber Threat Hunting Training (CCTHP) designed to prepare you for the Certified Cyber Threat Hunting Professional (CCTHP) exam. In this Cyber Threat Hunting Training (CCTHP) course, we will deep dive into “Threat hunting” and searching for threats and mitigate before the bad guy pounce Cyber Threat Hunting Training Seminar
  • 2. W W W . E N O I N S T I T U T E . C O M CCTHP WHO WE ARE ENO Institute, a worldwide leader in corporate blended learning solutions, has assembled a full complement of products and services to help you align corporate knowledge with business objectives. A pioneer in learning, ENO Institute has maintained a steadfast focus on developing a robust and highly acclaimed catalog of IT, desktop and professional development courses — including an MBA program! Our courses are derived from 25 years of first-hand technology experience and industry best practices. Our classes are customized to your team’s requirements and taught at your offices, Virtual Classroom and Online by world-class instructors with publications, patents, awards/honors, and a passion to share knowledge! M O B I L E F R I E N D L Y The power of real-time, interactive Virtual Classrooms has now become an integral part of our Learning environment whether through, laptops, PC, tablets, and smartphones! ENO Institute Virtual Classrooms can enhance the fast, easy sharing of information on the Internet using our data integration, audio, and video capabilities through a standard web browser — resulting in more comprehensive, flexible, and dynamic communications.
  • 3. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE IN THE NUTSHELL Learn how to find, assess and remove threats from your organization in our Certified Cyber Threat Hunting Training (CCTHP) designed to prepare you for the Certified Cyber Threat Hunting Professional (CCTHP) exam. In this Cyber Threat Hunting Training (CCTHP) course, we will deep dive into “Threat hunting” and searching for threats and mitigate before the bad guy pounce. And we will craft a series of attacks to check Enterprise security level and hunt for threats. An efficient Threat hunting approach towards Network, Web, Cloud, IoT Devices, Command & Control Channel(c2), Web shell, memory, OS, which will help you to gain a new level of knowledge and carry out all tasks with complete hands-on. This Cyber Threat Hunting Training (CCTHP) course focuses on capturing the adversary’s ability to compromise a network, conduct lateral movement, establish command and control, tunnel, and exfiltrate data. Students identify covert communications, malicious activity, and other network data anomalies. Instructors use various open source and custom-developed remote interrogation techniques to analyze networking devices and supporting systems to include logging and alerts. Instructors present students with real-world situations and enable them to perform HUNT operations across a corporate network.
  • 4. W W W . E N O I N S T I T U T E . C O M CCTHP CERTIFICATION DETAILS The Certified Cyber Threat Hunting Professional (CCTHP) certification is designed to certify that candidates have expert-level knowledge and skills in cyber threat identification and threat hunting. The CCTHP body of knowledge consists of five domains covering the responsibilities of a cyber threat hunter. The certification exam is a 50- question, traditional multiple-choice test. Questions are randomly pulled from a master list and must be completed in two hours. The five CCTHP domains are:  Cyber threat hunting definition and goals  Cyber threat hunting methodologies and techniques  Hunting for network-based cyber threats  Hunting for host-based cyber threats  Cyber threat hunting technologies and tools S T U D E N T S M A T E R I A L S  Three days of expert Certified Cyber Threat Hunting Training (CCTHP) with an expert instructor  Certified Cyber Threat Hunting Professional (CCTHP) Training Guide  1 exam voucher  100% Satisfaction Guarantee  Exam Pass Guarantee
  • 5. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE OBJECTIVES After attending the Cyber Threat Hunting Training, you will have the knowledge and skills to:  Think tactically regarding cyber threat defense  Use threat intelligence to form your own hypotheses and begin the hunt  Anticipate and hunt down threats in your organization’s systems  Inspect network information to identify dangerous traffic  Understand the Hunting Maturity Model to measure your organization’s hunting capability  Learn how to find and investigate malware, phishing, lateral movement, data exfiltration and other common threats C U S T O M I Z E I t  We can adapt this Cyber Threat Hunting Training (CCTHP) course to your group’s background and work requirements at little to no added cost.  If you are familiar with some aspects of this Cyber Threat Hunting (CCTHP) course, we can omit or shorten their discussion.  We can adjust the emphasis placed on the various topics or build the Cyber Threat Hunting Training (CCTHP) around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • 6. W W W . E N O I N S T I T U T E . C O M CCTHP AUDIENCE/TARGET GROUP Understanding the process of threat hunting is useful to any number of different jobs and teams. Our Cyber Threat Hunting Training would be perfect for anyone who wants to know more about threat hunting and the current threat landscape, such as:  Penetration testers  Red team members and other white hats  Incident-response team members  Security analysts  Engineers specializing in network security or IT  Security consultants and auditors  Managers wanting to create threat-hunting teams within their own companies C O U R S E P R E R E Q U I S I T E S The knowledge and skills that a learner must have before attending this Cyber Threat Hunting Training (CCTHP) course are:  Understanding of fundamental information security concepts  Working knowledge of networking devices and protocols  Exposure to pentesting and network monitoring tools and methodologies  Basic knowledge of Linux and Windows command line
  • 7. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE SYLLABUS DAY 1 Introduction to cyber threat hunting  What is threat hunting?  Assumption of breach  The concept of active defense  Role of threat hunting in organizational security program  Threat hunting benefits Threat hunting process  Preparing for the hunt: the hunter, the data, the tools  Creating a context-based hypothesis  Starting the hunt (confirming the hypothesis)  Responding to the attack  Lessons learned Threat hunting methodologies  The Crown Jewel Analysis (CJA)  Cyber threat patterns and signatures  Utilizing threat intelligence  Threat hunting hypotheses: intelligence-driven, awareness-driven, analytics-driven
  • 8. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE SYLLABUS DAY 2 Threat hunting techniques  Searching  Cluster analysis  Grouping  Stack counting Preparing for the hunt  What data do you need and how to get it?  Host and network visibility  Data gathering and analysis tools  Commercial and open-source threat hunting solutions The hunt is on  What threats can be hunted?  Introduction to IOCs and artifacts  IOCs and IOAs  Cyber kill chain  Hunting for network-based threats
  • 9. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE SYLLABUS DAY 2 (Cont.) Hunting for network-based threats  Network hunting overview (networking concepts, devices and communications, hunting tools)  Hunting for suspicious DNS requests and geographic abnormalities  Hunting for DDoS Activity  Hunting for suspicious domains, URLs and HTML responses  Hunting for irregular traffic: misused protocols,  port-application mismatches, web shells and other threats Hunting for host-based threats  Endpoint hunting overview (Windows and Linux processes, file systems, registry, hunting tools)  Malware (types, common activities, AV evasion, detection and analysis tools and methods)  Hunting for irregularities in processes  Hunting for registry and system file changes  Hunting for filenames and hashes  Hunting for abnormal account activity (brute-force attacks, privileged accounts)  Hunting for swells in database read volume  Hunting for unexpected patching of systems
  • 10. W W W . E N O I N S T I T U T E . C O M CCTHP COURSE SYLLABUS DAY 3 Utilizing system and security event data  Event logs and IDs  Logging on Windows and Linux  SIEM  Using event data during hunts Advanced threat hunting concepts  OODA (Observe, Orient, Decide, Act) loop  Going beyond IOCs: hunting for advanced threats  Chokepoint monitoring  Deceptive technologies  Developing an effective threat-hunting program  Building customized threat-hunting tools  Threat hunting best practices and resources
  • 11. W W W . E N O I N S T I T U T E . C O M CCTHP CONTACT OUR TRAINING EXPERTS S TA F F O R D , V I R G I N I A : 59 Tech Pkwy Stafford, Virginia 22556 Tel: 540.720.9660 Fax: 540.720.9664 TOLL: 888.742.3214 I N T E R N A T I O N A L : Tel: 540.720.9661 Fax: 540.720.9664 V I S I T E N O I N S T I T U T E W E B S I T E https://www.enoinstitute.com/ https://www.enoinstitute.com/training-tutorials-courses/cyber- threat-hunting-training-ccthp/ T A K E T H I S C O U R S E