77 Languages
English
Français
Español
Deutsch
Italiano
中文
हिंदी
العربية
Русский
Português
日本語
한국어
Türkçe
Polski
Nederlands
Magyar
Čeština
Svenska
Norsk
Dansk
Kiswahili
ไทย
বাংলা
فارسی
Tiếng Việt
Filipino
Afrikaans
Shqip
Azərbaycanca
Беларуская
Bosanski
Български
Hrvatski
Eesti
Suomi
ქართული
Kreyòl Ayisyen
Hawaiian
Bahasa Indonesia
Gaeilge
Қазақша
Lietuvių
Luganda
Lëtzebuergesch
Македонски
Melayu
Malti
Монгол
မြန်မာ
Norsk
فارسی
ਪੰਜਾਬੀ
Română
Samoan
संस्कृतम्
Српски
Sesotho
ChiShona
سنڌي
Slovenčina
Slovenščina
Soomaali
Basa Sunda
Kiswahili
Svenska
Тоҷикӣ
Татарча
ትግርኛ
Xitsonga
اردو
ئۇيغۇرچە
Oʻzbek
Cymraeg
Xhosa
ייִדיש
Yorùbá
Zulu
Apprentice Mode
10 Modules / ~100 pages
Wizard Mode
~25 Modules / ~400 pages
🎓
CREATE AN EVENT
Threat Hunting and Intelligence Analysis
( 24 Modules )
Module #1
Introduction to Threat Hunting
Overview of threat hunting, its importance, and key concepts
Module #2
Threat Intelligence Fundamentals
Understanding threat intelligence, types, and sources
Module #3
Threat Hunting Methodologies
Overview of threat hunting methodologies and frameworks
Module #4
The Cyber Kill Chain
Understanding the cyber kill chain and how to apply it to threat hunting
Module #5
Threat Hunting Tools and Techniques
Overview of tools and techniques used in threat hunting
Module #6
Network Traffic Analysis
Analyzing network traffic to identify potential threats
Module #7
Endpoint Analysis
Analyzing endpoint data to identify potential threats
Module #8
Log Analysis
Analyzing log data to identify potential threats
Module #9
Threat Hunting with SIGMA
Using SIGMA rules for threat hunting
Module #10
Threat Hunting with YARA
Using YARA rules for threat hunting
Module #11
Intelligence Gathering and Open-Source Intelligence (OSINT)
Gathering and analyzing open-source intelligence
Module #12
Structured Analytic Techniques
Applying structured analytic techniques to threat hunting
Module #13
Analysis of Competing Hypotheses (ACH)
Using ACH to evaluate competing hypotheses
Module #14
Threat Hunting for Ransomware
Identifying and hunting ransomware threats
Module #15
Threat Hunting for APTs
Identifying and hunting Advanced Persistent Threats
Module #16
Threat Hunting for Insider Threats
Identifying and hunting insider threats
Module #17
Threat Hunting for Cloud-Based Threats
Identifying and hunting cloud-based threats
Module #18
Threat Hunting for IoT-Based Threats
Identifying and hunting IoT-based threats
Module #19
Reporting and Communicating Threat Hunting Findings
Effectively reporting and communicating threat hunting findings
Module #20
Building a Threat Hunting Program
Building and maturing a threat hunting program
Module #21
Measuring the Effectiveness of a Threat Hunting Program
Measuring the effectiveness of a threat hunting program
Module #22
Threat Hunting in a SIEM Environment
Using SIEM to support threat hunting
Module #23
Threat Hunting with Machine Learning and AI
Using machine learning and AI to support threat hunting
Module #24
Course Wrap-Up & Conclusion
Planning next steps in Threat Hunting and Intelligence Analysis career
Ready to Learn, Share, and Compete?
Create Your Event Now
Language Learning Assistant
with Voice Support
Hello! Ready to begin? Let's test your microphone.
▶
Start Listening
Copyright 2025 @ WIZAPE.com
All Rights Reserved
CONTACT-US
PRIVACY POLICY