Conducting Threat Hunting & Defending using Cisco Technologies for CyberOps (CBRTHD)

The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

How You’ll Benefit

This training will help you:

  • Learn how to perform a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools
  • Gain leading-edge career skills focused on cybersecurity

Who Should Enroll

  • Security Operations Center staff
  • Security Operations Center (SOC) Tier 2 analysts
  • Threat hunters
  • Cyber threat analysts
  • Threat managers
  • Risk managements

Path Objectives

After taking this course, you should be able to:

  • Define threat hunting and identify core concepts used to conduct threat hunting investigations
  • Examine threat hunting investigation concepts, frameworks, and threat models
  • Define cyber threat hunting process fundamentals
  • Define threat hunting methodologies and procedures
  • Describe network-based threat hunting
  • Identify and review endpoint-based threat hunting
  • Identify and review endpoint memory-based threats and develop endpoint-based threat detection
  • Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
  • Describe the process of threat hunting from a practical perspective
  • Describe the process of threat hunt reporting

Learning Path Prerequisites

To fully benefit from this course, you should have the following knowledge and skills:

  • General knowledge of networks and network security

These skills can be found in the following Cisco Learning Offerings:

  • Implementing and Administering Cisco Solutions (CCNA)
  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Performing CyberOps Using Cisco Security Technologies (CBRCOR)

 

Learning Path Outline

  • Threat Hunting Theory
  • Threat Hunting Concepts, Frameworks, and Threat Models
  • Threat Hunting Process Fundamentals
  • Threat Hunting Methodologies and Procedures
  • Network-Based Threat Hunting
  • Endpoint-Based Threat Hunting
  • Endpoint-Based Threat Detection Development
  • Threat Hunting with Cisco Tools
  • Threat Hunting Investigation Summary: A Practical Approach
  • Reporting the Aftermath of a Threat Hunt Investigation

 

  • Price: $4,395.00
  • Duration: 5 days
  • Delivery Methods: Virtual
DateTimePriceOption
08/04/202509:00 AM - 05:00 PM CT$4,395.00
Enroll with CLC's