Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]

Durée totale
Localisation
A cet endroit, En ligne
Date et lieu de début

Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début
computer En ligne: VIRTUAL TRAINING CENTER
23 fév. 2026 jusqu'au 27 fév. 2026
computer En ligne: VIRTUAL TRAINING CENTER
9 mar. 2026 jusqu'au 13 mar. 2026
place2-Brussel Center (Koloniënstraat 11)
13 avr. 2026 jusqu'au 17 avr. 2026
computer En ligne: VIRTUAL TRAINING CENTRE
13 avr. 2026 jusqu'au 17 avr. 2026
computer En ligne: VIRTUAL TRAINING CENTER
18 mai 2026 jusqu'au 22 mai 2026
computer En ligne: VIRTUAL TRAINING CENTER
22 juin 2026 jusqu'au 26 juin 2026
computer En ligne: VIRTUAL TRAINING CENTER
6 juil. 2026 jusqu'au 10 juil. 2026
place1-Mechelen (Battelsesteenweg 455-B)
3 août 2026 jusqu'au 7 août 2026
computer En ligne: VIRTUAL TRAINING CENTRE
3 août 2026 jusqu'au 7 août 2026
computer En ligne: VIRTUAL TRAINING CENTER
14 sept. 2026 jusqu'au 18 sept. 2026
computer En ligne: VIRTUAL TRAINING CENTER
19 oct. 2026 jusqu'au 23 oct. 2026
computer En ligne: VIRTUAL TRAINING CENTER
9 nov. 2026 jusqu'au 13 nov. 2026
place1-Mechelen (Battelsesteenweg 455-B)
7 déc. 2026 jusqu'au 11 déc. 2026
computer En ligne: VIRTUAL TRAINING CENTRE
7 déc. 2026 jusqu'au 11 déc. 2026
Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

This training prepares you for the 300-22…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Cisco, Cisco Routing & Switching, Cisco Security, Cisco Professional (CCDP / CCNP) et Sécurité informatique.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification.

This course is worth 40 Continuing Education (CE) Credits.

OBJECTIVES

After completing this course you should be able to:

  • Define threat hunting and identify core concepts used to conduct threat hunting investigations 
  • Examine threat hunting investigation concepts, frameworks, and threat models 
  • Define cyber threat hunting process fundamentals 
  • Define threat hunting methodologies and procedures 
  • Describe network-based threat hunting 
  • Identify and review endpoint-based threat hunting 
  • Identify and review endpoint memory-based threats and develop endpoint-based threat detection 
  • Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting 
  • Describe the process of threat hunting from a practical perspective 
  • Describe the process of threat hunt reporting 

AUDIENCE

Anyone involved in the hunting of threats within a network.

CERTIFICATION

Recommended as preparation for the following exams:

  • 300-220  - Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps

 

CONTENT

Threat Hunting Theory

  • Threat Hunting Concepts
  • Threat Hunting Types
  • Conventional Threat Detection vs Threat Hunting

Threat Hunting Concepts, Frameworks and Threat Models

  • Cybersecurity Concepts
  • Common Threat Hunting Platforms
  • Threat Hunting Frameworks
  • Threat Modeling
  • Case Study: Use the PASTA Threat Model

Threat Hunting Process Fundamentals

  • Threat Hunting Approaches
  • Threat Hunting Tactics and Threat Intelligence
  • Defining Threat Hunt Scope and Boundaries
  • Planning the Threat Hunt Process 

Threat Hunting Methodologies and Procedures

  • Investigative Thinking
  • Identify Common Anolmalies
  • Analyze Device and System Logs
  • Determine the Best Threat Hunt Methods
  • Automate the Threat Hunting Process

Network-Based Threat Hunting

  • Operational Security Considerations
  • Performing Network Data Analysis and Detection Development
  • Performing Threat Hunting in the Cloud

Endpoint-Based Threat Hunting

  • Threat Hunting for Endpoint-Based Threats
  • Acquiring Data from Endpoint
  • Performing Host-Based Analysis

Endpoint-Based Threat Detection Development

  • Analyze Endpoint Memory
  • Examining Systems Memory Using Forensics
  • Developing Endpoint Detection Methods
  • Uncovering New Threats, Indicators and Building TTPs

Threat Hunting with Cisco Tools

  • Threat Hunting with Cisco Tools
  • Cisco XDR Components

Threat Hunting Investigation Summary: A Practical Approach

  • Conducting a Threat Hunt

Reporting the Aftermath of a Threat Hunt Investigation

  • Measure the Success of a Threat Hunt
  • Report Your Findings
  • Threat Hunting Outcomes

Labs

  • Discovery Lab 1: Categorize Threats with MITRE ATTACK Tactics and Techniques 
  • Discovery Lab 2: Compare Techniques Used by Different APTs with MITRE ATTACK Navigator 
  • Discovery Lab 3: Model Threats Using MITRE ATTACK and D3FEND 
  • Discovery Lab 4: Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain 
  • Discovery Lab 5: Determine the Priority Level of Attacks Using MITRE CAPEC 
  • Discovery Lab 6: Explore the TaHiTI Methodology 
  • Discovery Lab 7: Perform Threat Analysis Searches Using OSINT 
  • Discovery Lab 8: Attribute Threats to Adversary Groups and Software with MITRE ATTACK 
  • Discovery Lab 9: Emulate Adversaries with MITRE Caldera 
  • Discovery Lab 10: Find Evidence of Compromise Using Native Windows Tools 
  • Discovery Lab 11: Hunt for Suspicious Activities Using Open-Source Tools and SIEM 
  • Discovery Lab 12: Capturing of Network Traffic 
  • Discovery Lab 13: Extraction of IOC from Network Packets 
  • Discovery Lab 14: Usage of ELK Stack for Hunting Large Volumes of Network Data  
  • Discovery Lab 15: Analyzing Windows Event Logs and Mapping Them with MITRE Matrix 
  • Discovery Lab 16: Endpoint Data Acquisition 
  • Discovery Lab 17: Inspect Endpoints with PowerShell  
  • Discovery Lab 18: Perform Memory Forensics with Velociraptor 
  • Discovery Lab 19: Detect Malicious Processes on Endpoints 
  • Discovery Lab 20: Identify Suspicious Files Using Threat Analysis 
  • Discovery Lab 21: Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk 
  • Discovery Lab 22: Conduct Threat Hunt Using Cisco XDR Control Center and Investigate 
  • Discovery Lab 23: Initiate, Conduct, and Conclude a Threat Hunt 
Rester à jour sur les nouveaux avi
Pas encore d'avis.
  • Demander des informations à propos de cours. Dorénavant, nous recevrez aussi une notification lorsque qu'un autre utilisateur partage son avis. C'est un bon moyen de vous encourager à continuer d'apprendre!
  • Voir les produits similaires avec des avis: Cisco.
Partagez vos avis
Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.