Cyber Threat Hunting Training Boot Camp
Transform your career in 3 days
Course essentials
Cyber Threat Hunting training at a glance
-
Method
Online, in-person, team onsite
-
Duration
3 days
-
Experience
1-3 years of experience
-
Average salary
$113,270
What you'll learn
Training overview
Learn how to find, assess and remove threats from your organization in our Cyber Threat Hunting Boot Camp, designed to prepare you for the Certified Cyber Threat Hunting Professional (CCTHP) exam.
This immersive three-day course will teach you about the latest tactics and tools used to proactively track down hackers and cybercriminals. Taught by industry professionals who have served as penetration testers, incident responders and computer forensic investigators, the Cyber Threat Hunting Boot Camp builds expert-level knowledge and skills in cyber threat identification and threat hunting — and fully covers all five domains of the CCTHP exam.
Who should attend
Covering a wide range of skills, our Cyber Threat Hunting Boot Camp will equip you with the knowledge you can apply to many different roles. This is especially true for those with these job titles:
- Penetration testers
- Red team members and other white hats
- Incident-response team members
- Security analysts
- Engineers specializing in network security or IT
- Security consultants and auditors
- Managers wanting to create threat-hunting teams within their own companies
Award-winning training you can trust
Don't take our word for it
Read our independent reviews via TrustRadius
Ready to discuss your training goals? We've got you covered.
Complete the form and book a meeting with a member of our team to explore your learning opportunities.
Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.
Thanks! We look forward to meeting with you!
What's included
Everything you need to know
- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Hands-on cyber ranges and labs
- Knowledge Transfer Guarantee
- Onsite proctoring of exam
- Pre-study learning path
- Unlimited practice exam attempts
What makes the Infosec CCTHP prep course different?
You can rest assured that the CCTHP training materials are fully updated and synced with the latest version of the exam. In addition, you’ll gain access to a CCTHP prep course the moment you enroll, so you can prepare for and get the most out of your boot camp.
With 20 years of training experience, we stand by our CCTHP training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!
Before your boot camp
Prerequisites
Syllabus
Training schedule
Preparation (before the boot camp starts)
Prep course
Day 1
Introduction to cyber threat hunting
- What is threat hunting?
- Assumption of breach
- The concept of active defense
- Role of threat hunting in organizational security program
- Threat hunting benefits
Threat hunting process
- Preparing for the hunt: the hunter, the data, the tools
- Creating a context-based hypothesis
- Starting the hunt (confirming the hypothesis)
- Responding to the attack
- Lessons learned
Threat hunting methodologies
- The Crown Jewel Analysis (CJA)
- Cyber threat patterns and signatures
- Utilizing threat intelligence
- Threat hunting hypotheses: intelligence-driven, awareness-driven, analytics-driven
Optional group & individual study
Schedule may vary from class to class
Day 2
Threat hunting techniques
Preparing for the hunt
The hunt is on
Hunting for network-based threats
Hunting for host-based threats
Optional group & individual study
Schedule may vary from class to class
Day 3
Utilizing system and security event data
- Event logs and IDs
- Logging on Windows and Linux
- SIEM
- Using event data during hunts
Advanced threat hunting concepts
- OODA (Observe, Orient, Decide, Act) loop
- Going beyond IOCs: hunting for advanced threats
- Chokepoint monitoring
- Deceptive technologies
- Developing an effective threat-hunting program
- Building customized threat-hunting tools
- Threat hunting best practices and resources
CCTHP exam
What's next?
After you finish the cyber threat hunting training
There are many related or adjacent learning tracks and certifications for threat hunters. CompTIA’s Cybersecurity Analyst (CySA+) is a great certification to validate your security analyst skills. More senior technical professionals may consider earning their CASP+. On the offensive side, ethical hacking certifications like the CEH and PenTest+ are popular options. The most requested cybersecurity certification in job openings is the Certified Information Systems Security Professional (CISSP), which covers a broad overview of many cybersecurity domains.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.
Career Opportunities
What are the career opportunities like for Cyber Threat Hunting certified professionals?
As organizations become more proactive about their security, the career opportunities for cyber threat hunting professionals continue to grow. Threat hunters can also be called information security analysts, IT security analysts, cybersecurity analysts and senior security analysts. Professionals who work as threat hunters for several years may advance to more senior roles with titles such as:
- Senior cybersecurity analyst
- Threat intelligence analyst
- Cybersecurity engineer
What job titles are most common for people with Cyber Threat Hunting certification?
Some common positions that this certification can help you land include:
-
Chief information security officer
-
Cybersecurity architect
-
Vulnerability analyst
Average Salary
Cyber Threat Hunting certification salary expectations
Cyber threat hunting salaries vary greatly based on experience, certifications, skills, location and job title. However, the average cyber threat hunter earns around $113,000. Read our article on threat hunting careers to learn more.
Guaranteed results
Our boot camp guarantees
Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).
100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
FAQ
Frequently asked questions
What's the job outlook for Cyber Threat Hunting Professionals?
Threat hunters are mid- to senior-level professionals who detect, isolate and mitigate threats. They work to stop threats before an attack. The field is expected to grow 5% in the coming years. You can read more about career prospects for a cyber threat hunter in this article.
What is the average Cyber Threat Hunting Professional salary?
The average cyber threat hunter earns $113,000. However, those with more experience can make upwards of $165,000, according to the Bureau of Labor Statistics (BLS).
How does the Cyber Threat Hunting Professional (CCTHP) examination work?
The certification exam is a 50-question, traditional multiple-choice test. It must be completed in two hours. Questions are randomly pulled from a master list.
What are some tips for prepping for the Cyber Threat Hunting Professional (CCTHP) exam?
When preparing for the CCTHP exam, you should familiarize yourself with the exam format. You should also study the exam's five domains: Cyber threat hunting definition and goals
- Cyber threat hunting methodologies and techniques
- Hunting for network-based cyber threats
- Hunting for host-based cyber threats
- Cyber threat hunting technologies and tools
Explore our top boot camps