cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • #livevirtualclass

Threat Hunting with AI Support

Live Virtual Class - Super Intensive Remote Training with Labs!
March 23, 2026, 9:00 am
Days
Hours
Min.
Sec.

During this 5-day course in 35 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Threat Hunting with AI Support. Moreover, you will be able to:

    • Get the highest quality and unique learning experience – the class is limited to 20 participants by default.
    • Get the opportunity to interact with our world-renowned Experts.
    • Go through CQURE’s custom lab exercises and practice them after the course.
    • Receive a lifelong certification after completing the course!

(9:00am – 4:00pm CEST/CET Monday to Friday)

Original price was: €3784.Current price is: €3243. (TAX incl.*)

*Tax exemption available for eligible businesses

Lowest price within 30 days - €3000 (net)

Why this course?

Our Threat Hunting with AI Support course is a 5-day training (35 hours) designed for Security Analysts, IT Administrators, Incident Responders and Threat Hunters. During the course participants will learn some of the modern attack techniques, local privilege escalation methods and identity infrastructure attacks as well as the ways how those attacks could be detected and mitigated. This knowledge will be enhanced with case studies which will demonstrate how real-world attacks happen using the methods learned. Additionally, participants will be introduced to solutions, that with AI support can enhance the threat hunting process. The course will conclude with showcasing how threat hunting and threat detection design can be performed by leveraging manual and automated methods.

Our Threat Hunting with AI Support course is a 5-day training (35 hours) designed for Security Analysts, IT Administrators, Incident Responders and Threat Hunters. During the course participants will learn some of the modern attack techniques, local privilege escalation methods and identity infrastructure attacks as well as the ways how those attacks could be detected and mitigated. This knowledge will be enhanced with case studies which will demonstrate how real-world attacks happen using the methods learned. Additionally, participants will be introduced to solutions, that with AI support can enhance the threat hunting process. The course will conclude with showcasing how threat hunting and threat detection design can be performed by leveraging manual and automated methods.

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

Course benefits

How our lessons look like

  • Loads of Knowledge
  • Course materials
  • Unique exercises
  • Certification

Loads of Knowledge

During the course participants will learn some of the modern attack techniques, local privilege escalation methods and identity infrastructure attacks as well as the ways how those attacks could be detected and mitigated. This knowledge will be enhanced with case studies which will demonstrate how real-world attacks happen using the methods learned. Additionally, participants will be introduced to solutions, that with AI support can enhance the threat hunting process. The course will conclude with showcasing how threat hunting and threat detection design can be performed by leveraging manual and automated methods.

PowerShell is used throughout as both a defensive and investigative tool—supporting artifact collection, process and network analysis, registry inspection, and script-based detection. Participants will explore how attackers evade defenses through living-off-the-land techniques, scheduled tasks, and encoded payloads, and how to counter them using logging, event analysis, and behavioral detection rules.

The course also includes hands-on exercises in threat hunting, enterprise-scale data collection, and Active Directory enumeration. It concludes with a complete walkthrough of a fileless attack, enabling participants to trace, analyze, and report on each stage of an intrusion.

It is delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Course materials

During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!

Unique exercises

All exercises are based on Windows Server, Windows 10, Kali Linux, and Ubuntu.  After the workshop, you will receive PowerPoint slides, tools, and lab instructions.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Course syllabus

This Live Virtual Class consists of 13 Modules in terms of Threat Hunting with AI Supportg. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

    • 1. Discussion: Top attack techniques
      2. Advanced Persistent Threats
      3. Initial access vectors
      4. Phishing – rev shell mail phishing bob
      5. Valid Credentials– password spray exc.
      6. Spoofing – DSN Twist
      7. Vulnerable components (drive by download)
      8. Weak defaults
      a) Other vectors Escalation through Windows Services

Who is it for?

Audience

This course is designed for security professionals across offensive, defensive, and hybrid roles. Analysts, hunters, SOC teams, and incident responders will learn to enhance investigations with AI-driven workflows. Red and purple teamers will strengthen adversary emulation and detection validation, while engineers and developers gain hands-on experience building AI-powered tools, pipelines, and multi-agent systems. Security leaders and architects will benefit from practical insights into securing AI systems and addressing emerging vulnerabilities.

Platform and Technical Requirements

To participate in the course you need a computer with a stable internet connection (preferably Windows or Mac OS)

For best learning experience we also need you to have a webcam, headphones and a microphone.

Permissions for outgoing RDP connections to external servers (to our lab environment) –
UDP port 3391, TCP port 4343, TCP Port 443 (URI: lab.cqureacademy.com)

We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

Exercises

All exercises are based on Windows Server, Windows 10, Kali Linux, and Ubuntu. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed! You can also request purchase the additional access to the labs.

How to persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 5-day course in 35 hours super intensive training you will gain crucial cybersecurity knowledge and skills in terms oPowerShell for Digital Investigation & Threat Hunting. Moreover, you will be able to:

  • get the highest quality and unique learning experience
  • get the opportunity to interact with our world-renowned Experts
  • go through CQURE’s custom lab exercises and practice them after the course

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

No results found.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form