Course Overview

The news is full of tragic stories of organizations that failed to properly collect and act on cyber threat intelligence. Your organization wants to ensure the integrity and availability of its services and protect brand reputation in the face of ever-more-present cyber threat actors.

What You Will Learn

  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Gain the foundation knowledge of the threat hunting practice.
  • Learn about the frameworks and industry standards for hunting.
  • Create and participate in cyber threat intelligence collection and analysis
  • Gain an understanding of Cyber Threats.

Program Curriculum

Content
  • Chapter 1: Introduction to Threat Hunting
  • Chapter 2: Hunting TTPs
  • Chapter 3: Hunting Logs and Events
  • Chapter 4: Hunting Network Traffic
  • Chapter 5: Hunting with a SIEM
  • Chapter 6: Hunting with Other Tools
  • Chapter 7: Hunting Use Cases
  • Chapter 8: Course Conclu

Content
  • Chapter 1: Introduction
  • Chapter 2: Introduction to Threat Detection as Part of the Defense In-Depth Strategy
  • Chapter 3: Detecting Threats in On-Premises Environments
  • Chapter 4: Detecting Threats in Hybrid Cloud Environments
  • Chapter 5: Analyzing Threat Dete

Content
  • Chapter 1: The What and Why of Cyber Threat Intelligence
  • Chapter 2: Better Than the Rest: Brand Differentiation Through Security
  • Chapter 3: The Threat Intelligence Lifecycle
  • Chapter 4: Cyber Threat Intelligence Frameworks
  • Chapter 5: Cyber Threat Detection

Instructor

Elaine Gorman

Elaine Gorman is an active red team operator, offensive security certified professional, and alumnus of Christopher Newport University with a degree in Computer Science. She works with the tools and principles used in this course daily as a matter of professional necessity. She presents and teaches at local security groups and is uniquely positioned to offer guidance on threat intelligence analysis due to her career as a white-hat hacker. In her free time, she enjoys reading and playing guitar.

Marcos Vinicios Penha

Marcos Vinicios Penha has worked in companies in south and north America over the last 20 years. His experience ranges from defensive, offensive, incident response and infrastructure security. He has a variety of certifications in different fields of cyber-security, including CEH, CISSP, CRTE, CRTP, OSCP, F5-CA, Pentest+, CySA+, CASP+, Linux+, and others. Marcos has supported many companies worldwide to fight vulnerabilities, cyber-crime and advanced persistent threats while helping them to improve their maturity, visibility and protection controls. He has solid knowledge about the following subjects: Vulnerability Management, Red teaming, Ethical Hacking and Adversary Simulation, System Hardening, Defense Evasion, Threat Hunting, Incident Response, Blue teaming, Intrusion Detection and Prevention, Endpoint Detection and Response, Next-Gen Firewalls and Web Application Firewalls, and others. Marcos has been supporting the cyber-security community participating as a speaker in a variety of events worldwide.

Cristian Calinescu

Cristian Calinescu is a Microsoft certified Senior Infrastructure Engineer and Infrastructure Security Operations Manager. His areas of expertise are Microsoft Windows Server 2008 R2, 2012 R2, 2016, 2019, Microsoft Active Directory, Azure Active Directory, Microsoft Exchange (2003 - 2019), Virtualization (Hyper-V, VMWare), Linux OS, PowerShell (including scripting). Cristian has been involved in various maintenance and/or implementation projects based on the technologies mentioned above. He has also participated in network design and implementations projects as well as assisting customers migrating to the latest technologies.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Learning Paths

1 of 8

Quick View

Mastering Threat Intelligence

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Mastering Threat Intelligence

Mastering Threat Intelligence