Threat Hunting

5 Days online

BT223 - Threat Hunting
1 %
Case Studies

In today’s cybersecurity landscape, it isn’t possible to prevent every attack. Threat hunting is the proactive technique that focuses on pursuing attacks and the evidence that attackers leave behind when they perform an attack using malware or expose sensitive data.

The process is important and based on assuming that the attacker has already managed to infriltrate the system. The participant will learn to test everything possible to detect intrusion earlier to stop intruders before they can carry out their attacks and exploit them illegally.

This course is essential for:

Specialists and operatives with networking knowledge who want to acquire the threat hunting capabilities to protect their organization better.

  • Network administrators/specialists
  • Security Testers
  • Cybersecurity consultants
  • Red Team specialists
  • White hat hackers

Cyberium Arena

Cyberium Arena Logo
The CYBERIUM ARENA is a high-end cybersecurity Learning Management System and Simulator, which trains participants in the use of a wide variety of on-line tools for identifying the nature of a cyber attack and responding quickly and appropriately to prevent damage and disable the attacker.

Real Cases Studies

Case Study #1
A Microsoft subsidiary company has been targeted for an attack through newly discovered vulnerabilities leaked by the National Security Agency. The system administrator of the company suspects an attacker already got access to the systems and hid some files. It's your job to locate who and what was added into the system.
Case Study #2
Network administrators of OnePlus Technology Co. hired your assistance to analyze recent network traffic on the main website, after suffering a profoundly impacting data breach on their servers. You are given full access to servers to monitor the network and to report your findings.
Previous slide
Next slide

Remain informed about the training schedule:

More about:

The Network Security course trains basic skills in the search for cyber threats.

The Intrusion Testing (PenTest) course provides additional skills in search and defense against attacks.