fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course

*PREMIERE*
1-Day Introduction to Threat Hunting: Skills for Identifying Hidden Threats

Online Course with Paula Januszkiewicz, CQURE Founder & CEO, Microsoft MVP and Regional Director & Amr Thabet, Cybersecurity Expert
Days
Hours
Min.
Sec.

This 1-Day Course provides the participants with in-depth knowledge of contemporary attack techniques, including initial access vectors, phishing, spoofing, and privilege escalation methods, as well as strategies to trace and mitigate these threats.

This course designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.

    • 9,5-hour ON-DEMAND workshop.
    • Demo-intensive content from real case scenarios.
    • 12-month access to the course content incl. recording.
    • Lifelong certificate.

Original price was: €749.Current price is: €378.

Lowest price within 30 days - €378

Why 1 Day Mastery Course?

This course is designed to equip professionals with the expertise to tackle modern cybersecurity challenges.

Participants will gain in-depth knowledge of contemporary attack techniques, including initial access vectors and privilege escalation methods, as well as strategies to trace threats.

Through case studies, real-world scenarios are dissected to showcase the lifecycle of attacks and effective response measures.

The course is a deep dive into Windows authentication architecture and cryptography, uncovering the mechanisms behind NTLM, Kerberos, and identity theft techniques, along with methods to secure critical infrastructure. It also covers techniques for malware identification and analysis. We consider this course as an absolute base for ANYBODY who wants to get any approach to threat hunting!

This course is designed to equip professionals with the expertise to tackle modern cybersecurity challenges.

Participants will gain in-depth knowledge of contemporary attack techniques, including initial access vectors and privilege escalation methods, as well as strategies to trace threats.

Through case studies, real-world scenarios are dissected to showcase the lifecycle of attacks and effective response measures.

The course is a deep dive into Windows authentication architecture and cryptography, uncovering the mechanisms behind NTLM, Kerberos, and identity theft techniques, along with methods to secure critical infrastructure. It also covers techniques for malware identification and analysis. We consider this course as an absolute base for ANYBODY who wants to get any approach to threat hunting!

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

  • 1. Before the course

    Right after the purchase of the course, you will be provided with access to our learning platform.

  • 2. During the course

    You will be able to ask the Experts offline questions.

  • 3. After the course

    You will receive a Certificate of Completion, all the materials that have been created and presented by the trainers. Moreover, you will be granted access to our alumni community on the Discord server.

How is this training different from others?

  • Intensive learning
  • Only the newest content
  • The most effective learning
  • PROVEN techniques
  • Cool Experts
  • Certification
  • Social & Network

Intensive learning

This 9,5-hour ON-DEMAND workshop is packed with useful knowledge that will give you an overview and working knowledge of contemporary attack techniques, including initial access vectors, phishing, spoofing, and privilege escalation methods, as well as strategies to trace these threats.

Only the newest content

You’ll only learn crucial and relevant things.

You will explore malware analysis, learn to investigate both static and dynamic code, detect packed and encrypted samples, and analyze malicious functionalities. Hands-on exercises with industry tools will enhance understanding of how attackers maintain persistence, exploit vulnerabilities, and evade detection. This comprehensive training bridges theory and practice, empowering attendees with the skills needed to defend against evolving cyber threats.

The most effective learning

We know you’re busy, so we’re not going to waste your time with high-level theory and irrelevant reading material. You’ll get to dive into juicy, practical stuff in our demo-intensive workshop for the most effective (and useful) learning.

PROVEN techniques

It’s our mission to give you ONLY the proven tools and techniques that will position you as a credible cybersecurity specialist in the real world. Everything you’ll learn has been vetted by passionate practitioners from the CQURE Team.

Cool Experts

The best part is you’ll get to learn from some of the best cybersecurity specialists in their field!

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Social & Network

After the workshop, you’ll gain access to our exclusive Discord community server, where you can connect with others for networking activities, support, motivation, and more.

Course syllabus

This 1 Day Introductory Course includes essential theory as well as loads of  real-life scenarios.

  • Course content

    • Module 1: Introduction to Threat Hunting

      The introductory module of the course outlines the core principles, methodologies, and objectives of threat hunting, setting the stage for practical exploration and advanced techniques in subsequent modules.

    • Module 2: Permissions in Threat Hunting

      Module focuses on understanding and analyzing system permissions to uncover potential threats, detect misconfigurations, identify attempts to hide malicious activity through permissions, and ensure proper access control for enhanced security.

    • Module 3: SDDL in Threat Hunting

      Module highlights the importance of Security Descriptor Definition Language (SDDL) in uncovering hidden permissions and unclear settings, providing a clear view of resultant permissions on objects to identify potential security risks.

    • Module 4: Privileges in Attacks

      Module focuses on how attackers exploit privileges to gain unauthorized access, escalate their control within systems, and maintain persistence, emphasizing detection strategies and mitigation techniques to counter these threats.

    • Module 5: Account Rights

      Module provides an in-depth analysis of logon types, such as interactive, network, service, and remote logons, exploring how attackers leverage these methods to gain access, escalate privileges, and evade detection. The module also emphasizes detecting abnormal logon activity and misconfigurations to strengthen threat detection and response capabilities.

    • Module 6: Services and Their Misconfigurations

      Module explores common mistakes in service configurations that attackers frequently exploit, such as improper access controls, unsecured paths, and excessive permissions, providing insights into identifying and mitigating these vulnerabilities. Learn 5 biggest mistakes! 

    • Module 7a: Pass the…

      Module dives into various “pass-the” attack techniques, exploring their mechanisms and impact. The module includes forensic analysis methods, focusing on artifacts like the USN Journal and Prefetch, among other tools, to uncover evidence of these attacks and enhance threat-hunting capabilities.

    • Module 7b: Kerberos Tickets and Directory Access

      Module provides a deep dive into the mechanics of Kerberos authentication, focusing on ticket creation, usage, and potential abuse. It also explores how attackers exploit directory access to manipulate tickets, gain unauthorized privileges, and persist in the environment, while equipping participants with techniques to detect such activities.

    • Module 7c: Scanning for Credentials

      Module focuses on risk assessment by identifying where credentials are stored on the compromised machine. Participants will learn how to locate credentials, evaluate their sensitivity, and assess the potential impact of an attack based on the exposure and misuse of these credentials.

    • Module 8: Malware Analysis Process

      Module introduces the systematic approach to analyzing malicious software, covering key stages such as identification, static and dynamic analysis, behavioral monitoring, and reporting. This module provides a foundational understanding of how to dissect malware to uncover its functionality, objectives, and potential impact.

    • Module 8a: Basic Static Analysis

      Module introduces foundational techniques for examining malware without executing it, focusing on analyzing file metadata, identifying file types, extracting strings, and using tools like disassemblers to gain insights into the malware’s structure and potential behavior.

    • Module 8b: Packed Sample Indicators

      Module focuses on identifying signs of packed malware, such as unusual file structures, high entropy, and suspicious section names. It equips participants with techniques to recognize packing methods and analyze packed samples effectively to uncover hidden malicious content.

    • Case Study: Pony Malware

      Module provides an in-depth analysis of the Pony malware, focusing on its credential-stealing capabilities, command-and-control mechanisms, and obfuscation techniques. Participants will explore its architecture and learn how to detect, analyze, and mitigate this malware through real-world examples and forensic insights.

    • Module 9: Behavioral Malware Analysis

      Module explores techniques for analyzing the runtime behavior of malware by monitoring its interactions with the operating system, file system, network, and memory. Participants will learn how to identify indicators of compromise, observe malicious patterns, and use sandbox environments to safely analyze malware behavior.

    • Module 10: Malware Functionalities

      Module provides an overview of common malware capabilities, including data theft, system manipulation, persistence mechanisms, evasion techniques, and propagation methods. Participants will learn to recognize these functionalities during analysis to better understand the intent and impact of malicious software.

    • Module 11: Indication of Compromise & Yara Rules

      Module focuses on identifying signs of a breach through key indicators of compromise (IoCs) and leveraging Yara rules to detect and classify malicious files. Participants will learn how to create and optimize Yara rules for effective threat detection and response.

    • Module 12a Code Analysis

      Module focuses on examining malicious code to uncover its functionality, techniques, and intent. Participants will learn to decompile, debug, and analyze malware code to identify critical components, understand its behavior, and develop effective countermeasures.

    • Module 12b Code Analysis x86 Assembly #1

      Reviewing the sample. 

    • Module 12c Code Analysis x86 Assembly #2

      Reviewing the sample. 

    • Case Study: Static Analysis with IDA PRO

      Module provides hands-on experience in using IDA Pro for analyzing malware statically. Participants will explore real-world examples, learning how to navigate the interface, interpret disassembled code, and identify malicious functions and behavior without executing the malware.

    • Case Study: Dynamic Analysis with x64dbg

      Module offers practical experience in using x64dbg for dynamic malware analysis. Participants will learn how to debug malicious binaries, monitor their behavior in real-time, analyze runtime modifications, and uncover hidden functionalities through step-by-step examples.

Who is it for?

The course is designed for anyone interested in cybersecurity, regardless of experience level. Whether you’re just starting your journey or are already a seasoned professional, this course provides the tools and knowledge needed to identify and address hidden cyber threats. It’s especially suitable for:

  • Beginners and Students:
    If you’re new to cybersecurity, this course serves as an accessible entry point into threat hunting. You’ll learn foundational concepts, practical skills, and real-world techniques that will help you confidently step into the field of cybersecurity.
  • Threat Hunters:
    Those with an interest in uncovering cyber threats will gain a structured approach to mastering essential skills, from understanding permissions and misconfigurations to analyzing malware behavior.
  • Cybersecurity Enthusiasts:
    If you’re curious about how attackers operate and how to stop them, this course offers insights into the tools, methodologies, and mindset of a threat hunter.
  • SOC Analysts and IT Administrators:
    Beginners in these roles will benefit from learning proactive techniques to detect vulnerabilities and mitigate risks effectively.
  • Intermediate and Advanced Cybersecurity Professionals:
    Those looking to enhance their knowledge of specialized topics, such as malware analysis, system misconfigurations, and Yara rules, will find in-depth content and case studies to advance their expertise.

Whether you’re exploring cybersecurity for the first time or seeking to build a career in threat hunting, this course bridges the gap between theoretical knowledge and hands-on practical skills. You’ll come away prepared to contribute meaningfully to securing systems and identifying hidden threats.

How to persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 9,5-hour super-intensive workshop students be able to gain knowledge and skills for effective threat hunting and identifying hidden threats.

This course designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.

  • Get a unique learning experience.
  • Interact with our world-renowned Expert.
  • Get a personalised, lifelong certification!

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

Amr

Thabet

Cybersecurity Expert

Amr is a malware researcher and incident handler with over 12 years of experience, he worked in some of the Fortune 500 companies. He is the author of “Mastering Malware Analysis”.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form