OffSec’s Foundational Threat Hunting (TH-200) course provides cybersecurity professionals with the knowledge and practical skills required to identify and respond to attacks. This course covers the principles of threat hunting, as well as the tactics that firms use to identify and neutralize threats. Important topics covered include the use of network and endpoint Indicators of Compromise (IoCs) for proactive threat detection, as well as understanding the threat actor landscape, with a focus on ransomware and Advanced Persistent Threats.
After passing the challenging practical test, participants receive the OSTH-OffSec threat hunting certification. This certification demonstrates knowledge of fundamental threat hunting methodologies, making qualified workers an invaluable asset for employment in incident response, SOC analysis, and threat hunting teams.
Curriculum
- 10 Sections
- 0 Lessons
- 50 Days
- Module 01 â Introduction to Threat HuntingUnderstand the fundamentals of threat hunting, its importance, and how it differs from traditional detection and incident response.0
- Module 02 â Threat Hunting MethodologiesLearn structured approaches to threat hunting, including hypothesis-driven hunting and intelligence-based techniques.0
- Module 03 â Logs, Data Sources, and TelemetryExplore various data sources such as endpoint logs, network telemetry, and SIEM data used for effective threat hunting.0
- Module 04 â MITRE ATT&CK Framework for HuntingUnderstand how to use the MITRE ATT&CK framework to map attacker behaviors and guide hunting activities.0
- Module 05 â Endpoint Threat HuntingLearn how to detect suspicious activities on endpoints, including process analysis, persistence mechanisms, and malware indicators.0
- Module 06 â Network Threat HuntingAnalyze network traffic to identify anomalies, command-and-control communication, and lateral movement.0
- Module 07 â Threat Intelligence IntegrationLeverage threat intelligence to enhance hunting capabilities and identify known attacker patterns.0
- Module 08 â Detection EngineeringLearn how to convert hunting findings into detection rules and alerts for continuous monitoring.0
- Module 09 â Threat Hunting Tools and AutomationGain hands-on experience with tools used in hunting and learn how automation improves efficiency.0
- Module 10 â Reporting and CommunicationUnderstand how to document findings and communicate insights clearly to technical teams and stakeholders.0