77 Languages
Logo
WIZAPE
Apprentice Mode
10 Modules / ~100 pages
Wizard Mode
~25 Modules / ~400 pages

Threat Hunting and Intelligence Analysis
( 24 Modules )

Module #1
Introduction to Threat Hunting
Overview of threat hunting, its importance, and key concepts
Module #2
Threat Intelligence Fundamentals
Understanding threat intelligence, types, and sources
Module #3
Threat Hunting Methodologies
Overview of threat hunting methodologies and frameworks
Module #4
The Cyber Kill Chain
Understanding the cyber kill chain and how to apply it to threat hunting
Module #5
Threat Hunting Tools and Techniques
Overview of tools and techniques used in threat hunting
Module #6
Network Traffic Analysis
Analyzing network traffic to identify potential threats
Module #7
Endpoint Analysis
Analyzing endpoint data to identify potential threats
Module #8
Log Analysis
Analyzing log data to identify potential threats
Module #9
Threat Hunting with SIGMA
Using SIGMA rules for threat hunting
Module #10
Threat Hunting with YARA
Using YARA rules for threat hunting
Module #11
Intelligence Gathering and Open-Source Intelligence (OSINT)
Gathering and analyzing open-source intelligence
Module #12
Structured Analytic Techniques
Applying structured analytic techniques to threat hunting
Module #13
Analysis of Competing Hypotheses (ACH)
Using ACH to evaluate competing hypotheses
Module #14
Threat Hunting for Ransomware
Identifying and hunting ransomware threats
Module #15
Threat Hunting for APTs
Identifying and hunting Advanced Persistent Threats
Module #16
Threat Hunting for Insider Threats
Identifying and hunting insider threats
Module #17
Threat Hunting for Cloud-Based Threats
Identifying and hunting cloud-based threats
Module #18
Threat Hunting for IoT-Based Threats
Identifying and hunting IoT-based threats
Module #19
Reporting and Communicating Threat Hunting Findings
Effectively reporting and communicating threat hunting findings
Module #20
Building a Threat Hunting Program
Building and maturing a threat hunting program
Module #21
Measuring the Effectiveness of a Threat Hunting Program
Measuring the effectiveness of a threat hunting program
Module #22
Threat Hunting in a SIEM Environment
Using SIEM to support threat hunting
Module #23
Threat Hunting with Machine Learning and AI
Using machine learning and AI to support threat hunting
Module #24
Course Wrap-Up & Conclusion
Planning next steps in Threat Hunting and Intelligence Analysis career


  • Logo
    WIZAPE
Our priority is to cultivate a vibrant community before considering the release of a token. By focusing on engagement and support, we can create a solid foundation for sustainable growth. Let’s build this together!
We're giving our website a fresh new look and feel! 🎉 Stay tuned as we work behind the scenes to enhance your experience.
Get ready for a revamped site that’s sleeker, and packed with new features. Thank you for your patience. Great things are coming!

Copyright 2024 @ WIZAPE.com
All Rights Reserved
CONTACT-USPRIVACY POLICY