Course PER-366

Instructor-Led Training (Live)

Cyber threat Hunting

Length
0 h

About Course

Computers and servers in the United States are the most aggressively targeted systems in the world, commonly threatened by terrorists, nation states or terrorist sympathizers. Despite this growing threat level, training to counter these attacks has failed to increase in response, leaving critical information technology infrastructure exposed and vulnerable to attack.

This Cyber Threat Hunting (CTH) course utilizes a blended learning approach that balances classroom lecture, hands-on laboratory exercises and supplemental material to provide technical personnel with a strategy to proactively recognize and mitigate adversarial cyber events before they cause harm, unlike incident management, which is reactive. Using a CTH framework will allow for a consistent and efficient approach to identifying and responding to potential cyber threats. This approach encourages better record-keeping and the sharing of insights within security teams.

While much care is taken to protect systems, security intrusions can and do still happen. Organizations that actively seek out these cyber attacks that have infiltrated the security boundaries reduce the time that bad actors reside on their sites and effectively increase their cyber resilience.

By taking this course, participants will have an increased understanding of the cyber threat landscape for their business area and can establish a methodology to hunt for relevant system compromises to eliminate or limit their damage. Through skills-based labs they will use tools to gather cyber intel and sift through logs, network traffic, and memory to identify and triage potential threats.

Objectives

Upon successful completion of this course, participants will be able to:

  • Describe the difference between Cyber Threat Hunting and traditional Incident Response
  • Discuss the terms Risk, Threat, and Incident in the context of CTH
  • State the active trends that have led to including CTH plans in a cybersecurity configuration
  • Understand the Cyber Kill Chain steps, allowing security teams to detect, disrupt, and respond to threats at various points in the attack process
  • Describe the differences in current CTH frameworks to provide a structured approach for threat detection, and helps organizations proactively identify vulnerabilities that may have evaded traditional security measures
  • Identify resources for tracking current cyber threats in their organization’s vertical, so they have a more focused approach for CTH
  • Describe Common Vulnerabilities and Exposures (CVE) records in the CERT CVE database
  • Use the MITRE ATT&CK framework to identify Tactics, Technologies, and Procedures of attackers for the development of hunting triggers
  • Understand baseline and abnormal network traffic flow
  • Utilize Wireshark and tcpdump to analyze network packets
  • Identify network configurations of hosts (port/protocol/OS/service) for potential vulnerable targets using Nmap

Target Audience

Technical personnel and technical managers working within critical infrastructure, in both public and private sectors. Examples include law enforcement, state and local government, public utilities, health care providers, colleges and universities, or any other agency identified as a critical infrastructure by DHS/FEMA.

Prerequisites

This course is an intermediate-level hands-on course where prior knowledge and experience is required. Attendees are expected to have a working knowledge of TCP/IP and web technologies.

It is important to note that programming knowledge is NOT required for this course but there will be a small amount of device programming using Python and Ladder Diagram. Program code will be provided to the students for them to implement according to lab instructions.

Coming Soon!

Register

Requirements

This is a government-sponsored, live course. Areas shown in blue require government approval to register.

Contact the administrative agency of your state, tribe, or territory before registering.

FEMA Courses require a Student ID for registration. Get your FEMA SID here.

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Phone

(501) 570-8058

Website

https://cji.edu/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Phone

(501) 570-8058

Website

https://cji.edu/

This course is still in development.

Phone

(501) 570-8058

Website

https://cji.edu/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list