Cisco Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD)

Price
$4,395.00 USD

Duration
5 Days

Cisco Learning Credit (CLC) Eligible

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification. This training also earns you 40 credits towards recertification.

Course Objectives

  • Define threat hunting and identify core concepts used to conduct threat hunting investigations
  • Examine threat hunting investigation concepts, frameworks, and threat models
  • Define cyber threat hunting process fundamentals
  • Define threat hunting methodologies and procedures
  • Describe network-based threat hunting
  • Identify and review endpoint-based threat hunting
  • Identify and review endpoint memory-based threats and develop endpoint-based threat detection
  • Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
  • Describe the process of threat hunting from a practical perspective
  • Describe the process of threat hunt reporting

Who Should Attend?

  • Security Operations Center staff
  • Security Operations Center (SOC) Tier 2 Analysts
  • Threat Hunters
  • Cyber Threat Analysts
  • Threat Managers
  • Risk Managements
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Course Prerequisites

The knowledge and skills you are expected to have before attending this training are:

  • General knowledge of networks
  • Cisco CCNP Security certification

These skills can be found in the following Cisco Learning Offerings:

  • Implementing and Administering Cisco Solutions (CCNA)
  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Performing CyberOps Using Cisco Security Technologies (CBRCOR)
  • Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR)

Agenda

Outline:

  • 1. Threat Hunting Theory
  • 2. Threat Hunting Concepts, Frameworks, and Threat Models
  • 3. Threat Hunting Process Fundamentals
  • 4. Threat Hunting Methodologies and Procedures
  • 5. Network-Based Threat Hunting
  • 6. Endpoint-Based Threat Hunting
  • 7. Endpoint-Based Threat Detection Development
  • 8. Threat Hunting with Cisco Tools
  • 9. Threat Hunting Investigation Summary: A Practical Approach
  • 10. Reporting the Aftermath of a Threat Hunt Investigation
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons