Practical Cyber Threat Hunting

Why take this course?
🛡️ Course Title: Practical Cyber Threat Hunting: Purple Team Techniques Part 1 - Threat Hunting
Course Description:
Embark on a deep-dive into the world of cyber threat hunting with our expert instructor, M. Alparslan Akyıldız, in this comprehensive online course. This course is designed to equip you with the necessary skills to conduct effective threat hunting and compromise assessments, essential for safeguarding your organization's digital assets against sophisticated cyber threats.
🎓 What You'll Learn:
Module 1: Real-world Attack Scenarios & Cyber Threat Intelligence
- Understand the importance of cyber threat intelligence (CTI) and its sources and types.
- Gain insights into fundamental definitions and terms such as Indicators of Compromise (IOC), Tactics, Techniques, and Procedures (TTP), and the Cyber Kill Chain Model.
- Explore incident response steps and learn why monitoring and Security Information and Event Management (SIEM) infrastructure are crucial.
Module 2: Mastering Attack Techniques & Traffic Analysis
- Dive into theoretical knowledge of real attack techniques like SQL Injection, Buffer Overflow Exploits, SSH tunneling, and more.
- Learn how to collect and analyze full packet capture (pcap) traffic using specialized tools.
- Analyze real-world attack traffic from pcap files and share valuable insights from actual analysis experiences.
Module 3: Memory Forensics & Windows Process Injections
- Familiarize yourself with fundamental windows processes, process injections, hollowing techniques, and memory forensics.
- Understand tools and techniques for memory analysis, including case studies on Stuxnet, Cridex, Zeus, Darkcomet Rat, and DLL injection events.
- Discover the techniques used in attack labs to investigate and map attacks using the MITRE framework.
Module 4: Threat Hunting with ELK Stack & Investigative Techniques
- Learn how to perform threat hunting using the ELK (Elasticsearch, Logstash, Kibana) Stack.
- Analyze various malicious files such as Word documents, HTA files, and unsigned EXE files.
- Detect and investigate tunneling methods, persistency techniques like registry, services, and schedule tasks.
- Utilize tools like Google Rapid Response (GRR) and Osquery in labs for effective threat hunting.
🚀 Course Features:
- Real-life Attack Scenarios: Engage with adversary simulations to understand the tactics attackers use in real-world scenarios.
- Theoretical & Practical Knowledge: Balance between theoretical knowledge and practical application ensures a comprehensive understanding of cyber threats.
- Hands-on Analysis: Analyze actual network traffic, memory images, and malware to gain hands-on experience.
- Expert Guidance: Receive guidance from M. Alparslan Akyıldız, an expert in the field with real-world experience.
☁️ Important Announcement:
Please Note: While my Udemy Training videos are included in this course, memory images, pcaps, and virtual machines are not shared within Udemy. I am actively creating a lab environment on a different cloud platform. Upon completion of the lab network in the cloud, I will announce it, and you will have the opportunity to purchase the additional lab materials separately.
Join us now and become a cyber threat hunting expert with practical skills that will set you apart in the field of information security. Enroll in "Practical Cyber Threat Hunting: Purple Team Techniques Part 1 - Threat Hunting" today! 🔒💪💻
Course Gallery




Loading charts...