Skip to main Content

Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps

  • Référence CBRTHD
  • Durée 5 jour(s)
  • Version 1.1

Options de paiement complémentaires

  • CLC 44

Classe inter à distance Prix

EUR4,290.00

hors TVA

Demander une formation en intra-entreprise S'inscrire

Modalité pédagogique

La formation est disponible dans les formats suivants:

  • Classe inter à distance

    Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.

  • E-Learning

    Pour cette formation, il existe aussi un produit d’auto-formation en ligne. Nous consulter.

  • Classe inter en présentiel

    Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.

  • Intra-entreprise

    Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.

Demander cette formation dans un format différent

The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) course introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) course introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. Threat hunting involves going beyond what Security Operations Center (SOC) analysts already know or have been alerted to. Traditional cyber detection technologies will only identify malicious risks and behaviors. The art of threat hunting is about venturing into the unknown. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors. You will perform genuine threat hunting exercises within simulated network environments.

This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Cybersecurity certification.

This training also earns you 40 Continuing Education (CE) credits toward recertification.

Classe à Distance - site Client

Cette formation peut être suivie à distance en synchrone depuis n'importe quel site pourvu d'une connexion internet (2 Mb/s en symétrique recommandés). Le programme (théorie et pratique) suit le même déroulé pédagogique qu'en présentiel. La solution technologique adoptée permet aux apprenants à distance de suivre les présentations faites au tableau, de voir et d'entendre l'instructeur et les participants en temps réel, mais également d'échanger avec eux.

Prochaines dates

Haut de page
    • Modalité: Classe inter à distance
    • Date: 18-22 mai, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Français

    EUR4,290.00

    • Modalité: Classe inter à distance
    • Date: 22-26 juin, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR4,290.00

    • Modalité: Classe inter à distance
    • Date: 06-10 juillet, 2026 | 10:00 AM to 6:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR4,290.00

    • Modalité: Classe inter à distance
    • Date: 03-07 août, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR4,290.00

    • Modalité: Classe inter à distance
    • Date: 14-18 septembre, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Français

    EUR4,290.00

    • Modalité: Classe inter à distance
    • Date: 19-23 octobre, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR4,290.00

- Security Operations Center staff 
- SOC Tier 2 Analysts 
- Threat Hunters 
- Cyber Threat Analysts 
- Threat Managers
- Risk Managements

Objectifs de la formation

Haut de page

By the end of this course, you should be able to:

  • Define threat hunting and identify core concepts used to conduct threat hunting investigations
  • Examine threat hunting investigation concepts, frameworks, and threat models
  • Define cyber threat hunting process fundamentals
  • Define threat hunting methodologies and procedures
  • Describe network-based threat hunting
  • Identify and review endpoint-based threat hunting
  • Identify and review endpoint memory-based threats and develop endpoint-based threat detection
  • Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
  • Describe the process of threat hunting from a practical perspective
  • Describe the process of threat hunt reporting

Programme détaillé

Haut de page

Outline

  • Threat Hunting Theory
  • Threat Hunting Concepts, Frameworks, and Threat Models
  • Threat Hunting Process Fundamentals
  • Threat Hunting Methodologies and Procedures
  • Network-Based Threat Hunting
  • Endpoint-Based Threat Hunting
  • Endpoint-Based Threat Detection Development
  • Threat Hunting with Cisco Tools
  • Threat Hunting Investigation Summary: A Practical Approach
  • Aftermath of a Threat Hunt

Lab Outline

  • Categorize Threats with MITRE ATTACK Tactics and Techniques
  • Compare Techniques Used by Different APTs with MITRE ATTACK Navigator
  • Model Threats Using MITRE ATTACK and D3FEND
  • Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain
  • Determine the Priority Level of Attacks Using MITRE CAPEC
  • Explore the TaHiTI Methodology
  • Perform Threat Analysis Searches Using OSINT
  • Attribute Threats to Adversary Groups and Software with MITRE ATTACK
  • Emulate Adversaries with MITRE Caldera
  • Find Evidence of Compromise Using Native Windows Tools
  • Hunt for Suspicious Activities Using Open-Source Tools and SIEM
  • Capturing of Network Traffic
  • Extraction of IOC from Network Packets
  • Usage of ELK Stack for Hunting Large Volumes of Network Data
  • Analyzing Windows Event Logs and Mapping Them with MITRE Matrix
  • Endpoint Data Acquisition
  • Inspect Endpoints with PowerShell
  • Perform Memory Forensics with Velociraptor
  • Detect Malicious Processes on Endpoints
  • Identify Suspicious Files Using Threat Analysis
  • Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk
  • Conduct Threat Hunt Using Cisco XDR Control Center and Investigate
  • Initiate, Conduct, and Conclude a Threat Hunt

Pré-requis

Haut de page

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are: General knowledge of networks and network security

Pré-requis recommandés :

Certification

Haut de page
  • This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Cybersecurity certification.