Mastering Endpoint Detection and Response for Threat Hunters
You're not just fighting threats - you're racing against time, noise, and blind spots. Every missed alert could be the entry point for an attacker already inside your environment. You know the stakes. Yet most EDR tools flood you with data, not insight. And most training gives theory without tactics. Mastering Endpoint Detection and Response for Threat Hunters is the definitive program that transforms how you detect, investigate, and neutralize threats at the endpoint. No fluff, no filler - just the precision-engineered methodology used by elite analysts to reduce dwell time, increase detection accuracy, and turn EDR platforms into proactive hunting engines. This is not a generic cybersecurity course. It’s your roadmap from reactive monitoring to advanced threat hunting - going from overwhelmed to in control in under 30 days. You’ll finish with a battle-tested framework for conducting high-impact hunts, a library of custom detection logic, and a real-world project ready for your organisation or portfolio. Take Sarah Lin, a Tier 2 SOC analyst in Melbourne. After completing this program, she redesigned her team’s detection strategy around custom EDR analytics. Within six weeks, her organisation reduced false positives by 68% and discovered a previously undetected lateral movement campaign that had persisted for over two months. You already know EDR matters. But are you using it to its full potential? Or are you just waiting for the next alert to come in? Here’s how this course is structured to help you get there.Course Format & Delivery Details Self-Paced, On-Demand Access with Lifetime Updates
The entire Mastering Endpoint Detection and Response for Threat Hunters experience is designed for professionals who need maximum flexibility and zero friction. No rigid schedules, no mandatory live sessions - just immediate access to tools, frameworks, and step-by-step guidance you can apply on your own terms. Most learners complete the core curriculum in 25 to 30 hours. Many report deploying their first custom detection rule or hunt within the first 72 hours of enrollment. The faster you move, the faster you gain visibility and confidence. You receive instant access upon confirmation, with full 24/7 availability across devices. All materials are mobile-friendly, so you can review concepts during shifts, commutes, or downtime - ensuring you never lose momentum. Lifetime Access. Zero Expiration. Always Up to Date.
When you enroll, you're not buying a temporary license. You’re gaining permanent ownership of the course content, including all future updates at no additional cost. As new EDR capabilities emerge and attacker techniques evolve, your resources do too - automatically. This course is continuously reviewed and enhanced by our security research team to reflect real-world changes in attacker TTPs, EDR sensor advances, and detection engineering best practices. Direct Support from Threat Hunting Professionals
You're not going it alone. Throughout the course, you gain structured access to instructor-moderated guidance. Ask questions, submit challenge outputs for feedback, and receive expert clarification on detection logic, EDR query syntax, or hunt design - all within a private learning environment designed to protect operational security. Support is professional, timely, and role-specific. Whether you're transitioning from incident response, expanding your SOC capabilities, or preparing for red team engagement, the guidance meets you where you are. Certificate of Completion Issued by The Art of Service
Upon finishing the course and submitting your final threat hunt project, you receive a formal Certificate of Completion issued by The Art of Service - a globally recognised credential trusted by security teams across enterprises, government agencies, and MSSPs. This certificate validates your ability to design and execute advanced detection logic, conduct proactive endpoint investigations, and operationalise EDR beyond alert triage. It’s shareable on LinkedIn, included in résumés, and accepted as evidence of continuing professional development. Simple, Transparent Pricing - No Hidden Fees
You pay one straightforward fee. There are no subscriptions, no renewal charges, and no upsells. What you see is exactly what you get - lifetime access, full materials, support, and certification - all included upfront. Secure Payment via Visa, Mastercard, and PayPal
We accept all major payment methods. Your transaction is processed through a PCI-compliant gateway with end-to-end encryption. We do not store financial data. 100% Money-Back Guarantee - Satisfied or Refunded
We stand behind the value of this program so completely that we offer a full refund if you’re not satisfied. If, within the first 15 days, you find the course does not meet your expectations for clarity, depth, or applicability, simply request a refund. No questions asked. No risk taken. What Happens After Enrollment?
After registration, you’ll receive a confirmation email. Once your course materials are prepared, a separate access email will be sent with your login details and navigation instructions. This ensures every learner enters a stable, secure learning environment. “Will This Work for Me?” - The Answer Is Yes
It works even if you’ve never written a detection rule before. Even if your current EDR platform feels like a black box. Even if you’re not a developer or Python expert. This course starts with your existing permissions and tools - no admin rights, no API access, no lab environment required. It works even if you’re not part of a large threat hunting team. Solo practitioners, SOC analysts, and incident responders have all successfully applied the frameworks to improve detection coverage and reduce investigation time. Don’t take our word for it. One former student, Marcos Ruiz, Senior Analyst at a financial institution in Madrid, told us: “I used to spend hours chasing false positives. After Week 2 of this course, I built a hunt that found three compromised accounts in under an hour. My manager presented the findings to the CISO.” This is how security mastery is built - through precision, practice, and proven methodology. You’re not just learning. You’re transforming your operational impact.
Module 1: Foundations of Modern Endpoint Threats - Understanding the evolving threat landscape and the role of EDR
- Difference between antivirus, EPP, and EDR technologies
- How attackers bypass traditional defences using fileless techniques
- Key phases of the MITRE ATT&CK framework relevant to endpoint activity
- Common attacker objectives: data exfiltration, persistence, privilege escalation
- Understanding living-off-the-land binaries (LOLBins) and their detection
- The importance of telemetry richness in EDR platforms
- How attackers exploit native tools like PowerShell, WMI, and PsExec
- Overview of credential dumping techniques and detection signals
- Initial access vectors: phishing, RDP exposure, and supply chain compromise
- The role of process injection and direct memory access in evasion
- Understanding cross-platform threats: Windows, Linux, macOS endpoints
- Why traditional signature-based detection fails against modern threats
- Attackers’ use of obfuscation, encryption, and script wrappers
- Threat actor lifecycle: reconnaissance, execution, lateral movement
Module 2: Core Principles of Endpoint Detection and Response - How EDR agents collect and process endpoint telemetry
- Key data sources: process creation, network connections, registry changes
- Real-time monitoring vs. historical query capabilities
- Difference between detection rules, alerts, and hunt findings
- Understanding EDR query languages and search syntax
- Constructing time-based queries to investigate suspicious activity
- How to interpret process trees and parent-child relationships
- Identifying anomalous command-line arguments in process execution
- Analysing network connection logs for C2 beaconing patterns
- Using file integrity monitoring to detect malicious writes
- The role of memory scanning and behavioural heuristics
- How EDR handles event normalization and log aggregation
- Detecting suspicious PowerShell usage through script block logging
- Understanding WMI persistence mechanisms and monitoring options
- Mapping EDR capabilities to MITRE ATT&CK techniques
Module 3: Building Effective Detection Logic - Designing detection rules with high signal-to-noise ratio
- Writing precise EDR queries to avoid alert fatigue
- Using baseline normalcy to identify deviations
- Creating custom analytics for detecting suspicious process creation
- Building detection logic for anomalous service installations
- Identifying suspicious registry modifications related to persistence
- Detecting PsExec misuse across the enterprise
- Writing rules for unusual scheduled task creation
- Creating analytics for suspicious WMI consumers and filters
- Detecting named pipe creation used for lateral movement
- Building detection for LSASS memory access attempts
- Identifying suspicious PowerShell execution patterns
- Writing rules for Base64 encoded command lines
- Detecting use of certutil.exe for payload decoding
- Creating detection logic for Office applications spawning shells
- Building analytic rules for DLL side-loading attacks
- Detecting the use of ntdll.dll and kernel32.dll in unexpected contexts
- Writing queries for suspicious svchost.exe spawning patterns
- Creating detection rules for rundll32.exe abuse
- Using file hash reputation to flag known malicious binaries
Module 4: Operationalising Proactive Threat Hunting - Defining threat hunting: hypothesis-driven vs. alert-driven investigation
- Developing testable hypotheses based on threat intelligence
- Using ATT&CK Navigator to map hunting priorities
- Creating a threat hunting playbook for your environment
- Establishing repeatable hunting workflows
- How to conduct a hypothesis-based hunt using EDR data
- Using lateral movement hypotheses to uncover hidden access
- Searching for evidence of Kerberos ticket misuse (golden and silver tickets)
- Conducting hunts for signs of credential dumping activity
- Looking for evidence of token impersonation or privilege escalation
- Searching for unusual logon patterns: time, location, frequency
- Hunting for evidence of SMB-based lateral movement
- Investigating anomalous RDP session activity
- Searching for registry modifications associated with persistence
- Conducting file-based hunts for malicious script drops
- Hunting for evidence of data staging before exfiltration
- Using network connection data to identify beaconing
- Building a timeline of suspicious events across multiple endpoints
- Correlating events across domains, workstations, and servers
- Using time windows to detect coordinated attacker activity
Module 5: Advanced EDR Query Techniques - Mastering EDR-specific query syntax and operators
- Using wildcards, regular expressions, and string pattern matching
- Filtering results by time, host, user, or process
- Chaining multiple conditions using Boolean logic
- Using subqueries and nested filtering for complex analysis
- Searching across multiple data sources simultaneously
- Using aggregation functions to summarise findings
- Counting occurrences of suspicious process creation events
- Grouping results by hostname to identify systemic patterns
- Sorting results by frequency or severity for triage
- Exporting and saving query templates for reuse
- Creating reusable detection templates with parameterisation
- Using joins or correlations between event types
- Analysing command-line arguments for obfuscated payloads
- Searching for unusual process command-line length
- Identifying processes launching with high-privilege tokens
- Detecting processes running from temporary directories
- Searching for suspicious file extensions executed as binaries
- Using file signature and signing authority checks in queries
- Querying for unsigned or self-signed binaries in execution paths
Module 6: Investigating Lateral Movement and Privilege Escalation - Identifying signs of WMI-based lateral movement
- Detecting use of PsExec for remote command execution
- Investigating suspicious service installations across systems
- Analysing event logs for unexpected network logons (Type 3)
- Searching for evidence of pass-the-hash or pass-the-ticket attacks
- Detecting abnormal use of administrative shares (C$, ADMIN$)
- Investigating Kerberos AS-REQ and TGS-REQ anomalies
- Tracking unusual TGT request volumes by user or host
- Detecting suspicious LSASS memory access or dump attempts
- Identifying processes injecting into LSASS or using minidump APIs
- Searching for evidence of DCOM-based lateral movement
- Detecting use of Office applications to launch malicious payloads remotely
- Analysing scheduled tasks created via remote access
- Investigating PowerShell remoting (WinRM) abuse
- Detecting exploitation of SMB vulnerabilities for lateral movement
- Identifying suspicious net use or net session command usage
- Analysing command-line evidence of net.exe abuse
- Detecting use of Windows Defender binaries for lateral movement (wmic.exe)
- Searching for signs of SSH-based lateral movement on Linux endpoints
- Identifying unusual su or sudo usage patterns on Unix systems
Module 7: Hunting for Persistence Mechanisms - Identifying registry-based persistence: Run keys and services
- Detecting suspicious service creation or modification
- Searching for hidden or disguised services
- Analysing WMI event subscriptions for persistence
- Detecting creation of permanent event filters or consumers
- Investigating scheduled tasks with hidden or obfuscated names
- Searching for tasks running from AppData or Temp directories
- Identifying services running under high-privilege accounts
- Detecting startup folder modifications for persistence
- Searching for malicious shortcuts or .lnk file modifications
- Investigating use of COM hijacking for persistence
- Detecting AppInit DLLs and known hijack points
- Analysing image file execution options (IFEO) abuse
- Searching for Office add-ins or Outlook rules used for persistence
- Identifying suspicious browser extension installations
- Detecting use of PowerShell profile scripts for persistence
- Searching for malicious entries in Group Policy startup scripts
- Investigating use of BITS jobs for delayed execution
- Analysing service binaries with weak permissions
- Searching for DLL search order hijacking opportunities
Module 8: Detecting Data Exfiltration and Staging - Identifying signs of data compression prior to exfiltration
- Searching for use of zip, 7z, or rar executables in sensitive locations
- Detecting large file creation events in user directories
- Analysing file rename or move operations involving sensitive data
- Tracking file access patterns by non-owner users or processes
- Searching for evidence of data staging in temporary folders
- Detecting use of certutil or bitsadmin for data transfer
- Identifying network connections to rare external domains
- Searching for use of DNS tunneling indicators
- Analysing abnormal DNS query volumes or lengths
- Detecting use of cloud storage tools not approved in policy
- Monitoring for unusual outbound HTTPS traffic volumes
- Identifying use of web shells for data transfer
- Searching for FTP or SCP usage from non-secure systems
- Detecting use of encoded payloads in HTTP headers
- Analysing processes with high outbound network activity
- Searching for evidence of data exfiltration via email clients
- Identifying large clipboard operations followed by network activity
- Detecting use of removable media for data transfer
- Monitoring for file writes to USB or external drives
Module 9: Cross-Platform Threat Hunting (Linux and macOS) - Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Understanding the evolving threat landscape and the role of EDR
- Difference between antivirus, EPP, and EDR technologies
- How attackers bypass traditional defences using fileless techniques
- Key phases of the MITRE ATT&CK framework relevant to endpoint activity
- Common attacker objectives: data exfiltration, persistence, privilege escalation
- Understanding living-off-the-land binaries (LOLBins) and their detection
- The importance of telemetry richness in EDR platforms
- How attackers exploit native tools like PowerShell, WMI, and PsExec
- Overview of credential dumping techniques and detection signals
- Initial access vectors: phishing, RDP exposure, and supply chain compromise
- The role of process injection and direct memory access in evasion
- Understanding cross-platform threats: Windows, Linux, macOS endpoints
- Why traditional signature-based detection fails against modern threats
- Attackers’ use of obfuscation, encryption, and script wrappers
- Threat actor lifecycle: reconnaissance, execution, lateral movement
Module 2: Core Principles of Endpoint Detection and Response - How EDR agents collect and process endpoint telemetry
- Key data sources: process creation, network connections, registry changes
- Real-time monitoring vs. historical query capabilities
- Difference between detection rules, alerts, and hunt findings
- Understanding EDR query languages and search syntax
- Constructing time-based queries to investigate suspicious activity
- How to interpret process trees and parent-child relationships
- Identifying anomalous command-line arguments in process execution
- Analysing network connection logs for C2 beaconing patterns
- Using file integrity monitoring to detect malicious writes
- The role of memory scanning and behavioural heuristics
- How EDR handles event normalization and log aggregation
- Detecting suspicious PowerShell usage through script block logging
- Understanding WMI persistence mechanisms and monitoring options
- Mapping EDR capabilities to MITRE ATT&CK techniques
Module 3: Building Effective Detection Logic - Designing detection rules with high signal-to-noise ratio
- Writing precise EDR queries to avoid alert fatigue
- Using baseline normalcy to identify deviations
- Creating custom analytics for detecting suspicious process creation
- Building detection logic for anomalous service installations
- Identifying suspicious registry modifications related to persistence
- Detecting PsExec misuse across the enterprise
- Writing rules for unusual scheduled task creation
- Creating analytics for suspicious WMI consumers and filters
- Detecting named pipe creation used for lateral movement
- Building detection for LSASS memory access attempts
- Identifying suspicious PowerShell execution patterns
- Writing rules for Base64 encoded command lines
- Detecting use of certutil.exe for payload decoding
- Creating detection logic for Office applications spawning shells
- Building analytic rules for DLL side-loading attacks
- Detecting the use of ntdll.dll and kernel32.dll in unexpected contexts
- Writing queries for suspicious svchost.exe spawning patterns
- Creating detection rules for rundll32.exe abuse
- Using file hash reputation to flag known malicious binaries
Module 4: Operationalising Proactive Threat Hunting - Defining threat hunting: hypothesis-driven vs. alert-driven investigation
- Developing testable hypotheses based on threat intelligence
- Using ATT&CK Navigator to map hunting priorities
- Creating a threat hunting playbook for your environment
- Establishing repeatable hunting workflows
- How to conduct a hypothesis-based hunt using EDR data
- Using lateral movement hypotheses to uncover hidden access
- Searching for evidence of Kerberos ticket misuse (golden and silver tickets)
- Conducting hunts for signs of credential dumping activity
- Looking for evidence of token impersonation or privilege escalation
- Searching for unusual logon patterns: time, location, frequency
- Hunting for evidence of SMB-based lateral movement
- Investigating anomalous RDP session activity
- Searching for registry modifications associated with persistence
- Conducting file-based hunts for malicious script drops
- Hunting for evidence of data staging before exfiltration
- Using network connection data to identify beaconing
- Building a timeline of suspicious events across multiple endpoints
- Correlating events across domains, workstations, and servers
- Using time windows to detect coordinated attacker activity
Module 5: Advanced EDR Query Techniques - Mastering EDR-specific query syntax and operators
- Using wildcards, regular expressions, and string pattern matching
- Filtering results by time, host, user, or process
- Chaining multiple conditions using Boolean logic
- Using subqueries and nested filtering for complex analysis
- Searching across multiple data sources simultaneously
- Using aggregation functions to summarise findings
- Counting occurrences of suspicious process creation events
- Grouping results by hostname to identify systemic patterns
- Sorting results by frequency or severity for triage
- Exporting and saving query templates for reuse
- Creating reusable detection templates with parameterisation
- Using joins or correlations between event types
- Analysing command-line arguments for obfuscated payloads
- Searching for unusual process command-line length
- Identifying processes launching with high-privilege tokens
- Detecting processes running from temporary directories
- Searching for suspicious file extensions executed as binaries
- Using file signature and signing authority checks in queries
- Querying for unsigned or self-signed binaries in execution paths
Module 6: Investigating Lateral Movement and Privilege Escalation - Identifying signs of WMI-based lateral movement
- Detecting use of PsExec for remote command execution
- Investigating suspicious service installations across systems
- Analysing event logs for unexpected network logons (Type 3)
- Searching for evidence of pass-the-hash or pass-the-ticket attacks
- Detecting abnormal use of administrative shares (C$, ADMIN$)
- Investigating Kerberos AS-REQ and TGS-REQ anomalies
- Tracking unusual TGT request volumes by user or host
- Detecting suspicious LSASS memory access or dump attempts
- Identifying processes injecting into LSASS or using minidump APIs
- Searching for evidence of DCOM-based lateral movement
- Detecting use of Office applications to launch malicious payloads remotely
- Analysing scheduled tasks created via remote access
- Investigating PowerShell remoting (WinRM) abuse
- Detecting exploitation of SMB vulnerabilities for lateral movement
- Identifying suspicious net use or net session command usage
- Analysing command-line evidence of net.exe abuse
- Detecting use of Windows Defender binaries for lateral movement (wmic.exe)
- Searching for signs of SSH-based lateral movement on Linux endpoints
- Identifying unusual su or sudo usage patterns on Unix systems
Module 7: Hunting for Persistence Mechanisms - Identifying registry-based persistence: Run keys and services
- Detecting suspicious service creation or modification
- Searching for hidden or disguised services
- Analysing WMI event subscriptions for persistence
- Detecting creation of permanent event filters or consumers
- Investigating scheduled tasks with hidden or obfuscated names
- Searching for tasks running from AppData or Temp directories
- Identifying services running under high-privilege accounts
- Detecting startup folder modifications for persistence
- Searching for malicious shortcuts or .lnk file modifications
- Investigating use of COM hijacking for persistence
- Detecting AppInit DLLs and known hijack points
- Analysing image file execution options (IFEO) abuse
- Searching for Office add-ins or Outlook rules used for persistence
- Identifying suspicious browser extension installations
- Detecting use of PowerShell profile scripts for persistence
- Searching for malicious entries in Group Policy startup scripts
- Investigating use of BITS jobs for delayed execution
- Analysing service binaries with weak permissions
- Searching for DLL search order hijacking opportunities
Module 8: Detecting Data Exfiltration and Staging - Identifying signs of data compression prior to exfiltration
- Searching for use of zip, 7z, or rar executables in sensitive locations
- Detecting large file creation events in user directories
- Analysing file rename or move operations involving sensitive data
- Tracking file access patterns by non-owner users or processes
- Searching for evidence of data staging in temporary folders
- Detecting use of certutil or bitsadmin for data transfer
- Identifying network connections to rare external domains
- Searching for use of DNS tunneling indicators
- Analysing abnormal DNS query volumes or lengths
- Detecting use of cloud storage tools not approved in policy
- Monitoring for unusual outbound HTTPS traffic volumes
- Identifying use of web shells for data transfer
- Searching for FTP or SCP usage from non-secure systems
- Detecting use of encoded payloads in HTTP headers
- Analysing processes with high outbound network activity
- Searching for evidence of data exfiltration via email clients
- Identifying large clipboard operations followed by network activity
- Detecting use of removable media for data transfer
- Monitoring for file writes to USB or external drives
Module 9: Cross-Platform Threat Hunting (Linux and macOS) - Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Designing detection rules with high signal-to-noise ratio
- Writing precise EDR queries to avoid alert fatigue
- Using baseline normalcy to identify deviations
- Creating custom analytics for detecting suspicious process creation
- Building detection logic for anomalous service installations
- Identifying suspicious registry modifications related to persistence
- Detecting PsExec misuse across the enterprise
- Writing rules for unusual scheduled task creation
- Creating analytics for suspicious WMI consumers and filters
- Detecting named pipe creation used for lateral movement
- Building detection for LSASS memory access attempts
- Identifying suspicious PowerShell execution patterns
- Writing rules for Base64 encoded command lines
- Detecting use of certutil.exe for payload decoding
- Creating detection logic for Office applications spawning shells
- Building analytic rules for DLL side-loading attacks
- Detecting the use of ntdll.dll and kernel32.dll in unexpected contexts
- Writing queries for suspicious svchost.exe spawning patterns
- Creating detection rules for rundll32.exe abuse
- Using file hash reputation to flag known malicious binaries
Module 4: Operationalising Proactive Threat Hunting - Defining threat hunting: hypothesis-driven vs. alert-driven investigation
- Developing testable hypotheses based on threat intelligence
- Using ATT&CK Navigator to map hunting priorities
- Creating a threat hunting playbook for your environment
- Establishing repeatable hunting workflows
- How to conduct a hypothesis-based hunt using EDR data
- Using lateral movement hypotheses to uncover hidden access
- Searching for evidence of Kerberos ticket misuse (golden and silver tickets)
- Conducting hunts for signs of credential dumping activity
- Looking for evidence of token impersonation or privilege escalation
- Searching for unusual logon patterns: time, location, frequency
- Hunting for evidence of SMB-based lateral movement
- Investigating anomalous RDP session activity
- Searching for registry modifications associated with persistence
- Conducting file-based hunts for malicious script drops
- Hunting for evidence of data staging before exfiltration
- Using network connection data to identify beaconing
- Building a timeline of suspicious events across multiple endpoints
- Correlating events across domains, workstations, and servers
- Using time windows to detect coordinated attacker activity
Module 5: Advanced EDR Query Techniques - Mastering EDR-specific query syntax and operators
- Using wildcards, regular expressions, and string pattern matching
- Filtering results by time, host, user, or process
- Chaining multiple conditions using Boolean logic
- Using subqueries and nested filtering for complex analysis
- Searching across multiple data sources simultaneously
- Using aggregation functions to summarise findings
- Counting occurrences of suspicious process creation events
- Grouping results by hostname to identify systemic patterns
- Sorting results by frequency or severity for triage
- Exporting and saving query templates for reuse
- Creating reusable detection templates with parameterisation
- Using joins or correlations between event types
- Analysing command-line arguments for obfuscated payloads
- Searching for unusual process command-line length
- Identifying processes launching with high-privilege tokens
- Detecting processes running from temporary directories
- Searching for suspicious file extensions executed as binaries
- Using file signature and signing authority checks in queries
- Querying for unsigned or self-signed binaries in execution paths
Module 6: Investigating Lateral Movement and Privilege Escalation - Identifying signs of WMI-based lateral movement
- Detecting use of PsExec for remote command execution
- Investigating suspicious service installations across systems
- Analysing event logs for unexpected network logons (Type 3)
- Searching for evidence of pass-the-hash or pass-the-ticket attacks
- Detecting abnormal use of administrative shares (C$, ADMIN$)
- Investigating Kerberos AS-REQ and TGS-REQ anomalies
- Tracking unusual TGT request volumes by user or host
- Detecting suspicious LSASS memory access or dump attempts
- Identifying processes injecting into LSASS or using minidump APIs
- Searching for evidence of DCOM-based lateral movement
- Detecting use of Office applications to launch malicious payloads remotely
- Analysing scheduled tasks created via remote access
- Investigating PowerShell remoting (WinRM) abuse
- Detecting exploitation of SMB vulnerabilities for lateral movement
- Identifying suspicious net use or net session command usage
- Analysing command-line evidence of net.exe abuse
- Detecting use of Windows Defender binaries for lateral movement (wmic.exe)
- Searching for signs of SSH-based lateral movement on Linux endpoints
- Identifying unusual su or sudo usage patterns on Unix systems
Module 7: Hunting for Persistence Mechanisms - Identifying registry-based persistence: Run keys and services
- Detecting suspicious service creation or modification
- Searching for hidden or disguised services
- Analysing WMI event subscriptions for persistence
- Detecting creation of permanent event filters or consumers
- Investigating scheduled tasks with hidden or obfuscated names
- Searching for tasks running from AppData or Temp directories
- Identifying services running under high-privilege accounts
- Detecting startup folder modifications for persistence
- Searching for malicious shortcuts or .lnk file modifications
- Investigating use of COM hijacking for persistence
- Detecting AppInit DLLs and known hijack points
- Analysing image file execution options (IFEO) abuse
- Searching for Office add-ins or Outlook rules used for persistence
- Identifying suspicious browser extension installations
- Detecting use of PowerShell profile scripts for persistence
- Searching for malicious entries in Group Policy startup scripts
- Investigating use of BITS jobs for delayed execution
- Analysing service binaries with weak permissions
- Searching for DLL search order hijacking opportunities
Module 8: Detecting Data Exfiltration and Staging - Identifying signs of data compression prior to exfiltration
- Searching for use of zip, 7z, or rar executables in sensitive locations
- Detecting large file creation events in user directories
- Analysing file rename or move operations involving sensitive data
- Tracking file access patterns by non-owner users or processes
- Searching for evidence of data staging in temporary folders
- Detecting use of certutil or bitsadmin for data transfer
- Identifying network connections to rare external domains
- Searching for use of DNS tunneling indicators
- Analysing abnormal DNS query volumes or lengths
- Detecting use of cloud storage tools not approved in policy
- Monitoring for unusual outbound HTTPS traffic volumes
- Identifying use of web shells for data transfer
- Searching for FTP or SCP usage from non-secure systems
- Detecting use of encoded payloads in HTTP headers
- Analysing processes with high outbound network activity
- Searching for evidence of data exfiltration via email clients
- Identifying large clipboard operations followed by network activity
- Detecting use of removable media for data transfer
- Monitoring for file writes to USB or external drives
Module 9: Cross-Platform Threat Hunting (Linux and macOS) - Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Mastering EDR-specific query syntax and operators
- Using wildcards, regular expressions, and string pattern matching
- Filtering results by time, host, user, or process
- Chaining multiple conditions using Boolean logic
- Using subqueries and nested filtering for complex analysis
- Searching across multiple data sources simultaneously
- Using aggregation functions to summarise findings
- Counting occurrences of suspicious process creation events
- Grouping results by hostname to identify systemic patterns
- Sorting results by frequency or severity for triage
- Exporting and saving query templates for reuse
- Creating reusable detection templates with parameterisation
- Using joins or correlations between event types
- Analysing command-line arguments for obfuscated payloads
- Searching for unusual process command-line length
- Identifying processes launching with high-privilege tokens
- Detecting processes running from temporary directories
- Searching for suspicious file extensions executed as binaries
- Using file signature and signing authority checks in queries
- Querying for unsigned or self-signed binaries in execution paths
Module 6: Investigating Lateral Movement and Privilege Escalation - Identifying signs of WMI-based lateral movement
- Detecting use of PsExec for remote command execution
- Investigating suspicious service installations across systems
- Analysing event logs for unexpected network logons (Type 3)
- Searching for evidence of pass-the-hash or pass-the-ticket attacks
- Detecting abnormal use of administrative shares (C$, ADMIN$)
- Investigating Kerberos AS-REQ and TGS-REQ anomalies
- Tracking unusual TGT request volumes by user or host
- Detecting suspicious LSASS memory access or dump attempts
- Identifying processes injecting into LSASS or using minidump APIs
- Searching for evidence of DCOM-based lateral movement
- Detecting use of Office applications to launch malicious payloads remotely
- Analysing scheduled tasks created via remote access
- Investigating PowerShell remoting (WinRM) abuse
- Detecting exploitation of SMB vulnerabilities for lateral movement
- Identifying suspicious net use or net session command usage
- Analysing command-line evidence of net.exe abuse
- Detecting use of Windows Defender binaries for lateral movement (wmic.exe)
- Searching for signs of SSH-based lateral movement on Linux endpoints
- Identifying unusual su or sudo usage patterns on Unix systems
Module 7: Hunting for Persistence Mechanisms - Identifying registry-based persistence: Run keys and services
- Detecting suspicious service creation or modification
- Searching for hidden or disguised services
- Analysing WMI event subscriptions for persistence
- Detecting creation of permanent event filters or consumers
- Investigating scheduled tasks with hidden or obfuscated names
- Searching for tasks running from AppData or Temp directories
- Identifying services running under high-privilege accounts
- Detecting startup folder modifications for persistence
- Searching for malicious shortcuts or .lnk file modifications
- Investigating use of COM hijacking for persistence
- Detecting AppInit DLLs and known hijack points
- Analysing image file execution options (IFEO) abuse
- Searching for Office add-ins or Outlook rules used for persistence
- Identifying suspicious browser extension installations
- Detecting use of PowerShell profile scripts for persistence
- Searching for malicious entries in Group Policy startup scripts
- Investigating use of BITS jobs for delayed execution
- Analysing service binaries with weak permissions
- Searching for DLL search order hijacking opportunities
Module 8: Detecting Data Exfiltration and Staging - Identifying signs of data compression prior to exfiltration
- Searching for use of zip, 7z, or rar executables in sensitive locations
- Detecting large file creation events in user directories
- Analysing file rename or move operations involving sensitive data
- Tracking file access patterns by non-owner users or processes
- Searching for evidence of data staging in temporary folders
- Detecting use of certutil or bitsadmin for data transfer
- Identifying network connections to rare external domains
- Searching for use of DNS tunneling indicators
- Analysing abnormal DNS query volumes or lengths
- Detecting use of cloud storage tools not approved in policy
- Monitoring for unusual outbound HTTPS traffic volumes
- Identifying use of web shells for data transfer
- Searching for FTP or SCP usage from non-secure systems
- Detecting use of encoded payloads in HTTP headers
- Analysing processes with high outbound network activity
- Searching for evidence of data exfiltration via email clients
- Identifying large clipboard operations followed by network activity
- Detecting use of removable media for data transfer
- Monitoring for file writes to USB or external drives
Module 9: Cross-Platform Threat Hunting (Linux and macOS) - Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Identifying registry-based persistence: Run keys and services
- Detecting suspicious service creation or modification
- Searching for hidden or disguised services
- Analysing WMI event subscriptions for persistence
- Detecting creation of permanent event filters or consumers
- Investigating scheduled tasks with hidden or obfuscated names
- Searching for tasks running from AppData or Temp directories
- Identifying services running under high-privilege accounts
- Detecting startup folder modifications for persistence
- Searching for malicious shortcuts or .lnk file modifications
- Investigating use of COM hijacking for persistence
- Detecting AppInit DLLs and known hijack points
- Analysing image file execution options (IFEO) abuse
- Searching for Office add-ins or Outlook rules used for persistence
- Identifying suspicious browser extension installations
- Detecting use of PowerShell profile scripts for persistence
- Searching for malicious entries in Group Policy startup scripts
- Investigating use of BITS jobs for delayed execution
- Analysing service binaries with weak permissions
- Searching for DLL search order hijacking opportunities
Module 8: Detecting Data Exfiltration and Staging - Identifying signs of data compression prior to exfiltration
- Searching for use of zip, 7z, or rar executables in sensitive locations
- Detecting large file creation events in user directories
- Analysing file rename or move operations involving sensitive data
- Tracking file access patterns by non-owner users or processes
- Searching for evidence of data staging in temporary folders
- Detecting use of certutil or bitsadmin for data transfer
- Identifying network connections to rare external domains
- Searching for use of DNS tunneling indicators
- Analysing abnormal DNS query volumes or lengths
- Detecting use of cloud storage tools not approved in policy
- Monitoring for unusual outbound HTTPS traffic volumes
- Identifying use of web shells for data transfer
- Searching for FTP or SCP usage from non-secure systems
- Detecting use of encoded payloads in HTTP headers
- Analysing processes with high outbound network activity
- Searching for evidence of data exfiltration via email clients
- Identifying large clipboard operations followed by network activity
- Detecting use of removable media for data transfer
- Monitoring for file writes to USB or external drives
Module 9: Cross-Platform Threat Hunting (Linux and macOS) - Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Understanding differences in EDR telemetry on Linux endpoints
- Key data sources: process execution, systemd services, cron jobs
- Detecting suspicious SSH login attempts and brute force patterns
- Searching for use of base64 or other encoding in command lines
- Identifying privilege escalation via sudo abuse
- Detecting exploitation of sudo misconfigurations (NOPASSWD)
- Searching for evidence of cron-based persistence
- Analysing anomalous crontab modifications
- Investigating use of curl or wget for payload retrieval
- Tracking unusual use of package managers (apt, yum, pacman)
- Detecting reverse shell patterns in Bash command lines
- Searching for use of tools like netcat, socat, or telnet for C2
- Analysing systemd service creation for malicious purposes
- Detecting suspicious kernel module loading
- Understanding EDR capabilities on macOS endpoints
- Tracking launch agent and daemon creation for persistence
- Detecting use of osascript for malicious execution
- Searching for suspicious plist modifications
- Identifying unusual Safari or Chrome extensions
- Analysing use of Terminal for encoded command execution
Module 10: Automating Detection and Response Workflows - Understanding EDR integration with SIEM and SOAR platforms
- Automating common investigation steps using playbooks
- Creating alert suppression rules based on known benign activity
- Designing automated containment actions for confirmed threats
- Using tagging and annotation to track investigation status
- Setting up custom dashboards for key detection metrics
- Automating hunting task scheduling within EDR consoles
- Configuring email or Slack notifications for critical findings
- Building custom reports for stakeholder communication
- Exporting hunt results in STIX or CSV formats
- Integrating threat intelligence feeds into EDR detection
- Using indicator of compromise (IOC) lists to validate hunting scope
- Automating IOC scanning across historical endpoint data
- Creating exclusion lists to reduce false positives
- Implementing risk scoring models for detected entities
- Tagging hosts based on exposure level or compromise likelihood
- Using asset criticality to prioritise response actions
- Automating post-hunt actions: isolation, file quarantine, process kill
- Setting up periodic revalidation of historical hunts
- Documenting and versioning detection logic for audit purposes
Module 11: Real-World Threat Hunt Projects - Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data
Module 12: Certification and Professional Advancement - Final assessment: submission of a complete threat hunting report
- Requirements for earning the Certificate of Completion
- How to present your project to technical and executive stakeholders
- Best practices for documenting detection logic and findings
- Incorporating risk context and business impact into reports
- How to share your certification on LinkedIn and résumés
- Using your completed project as a portfolio piece
- Integrating course frameworks into your current security operations
- Scaling threat hunting practices across teams
- Building a culture of proactive detection in your organisation
- Next steps: advancing to purple teaming or automation engineering
- Recommended resources for continued learning
- Access to alumni updates and detection rule templates
- Guidance on pursuing advanced security certifications
- Connecting with security professionals through official community channels
- How to stay current with evolving EDR capabilities
- Participating in real-world detection challenges
- Using your skills to influence security tooling decisions
- Leveraging your new expertise for career growth
- Final verification of course completion and certificate issuance
- Conducting a credential access hunt across Windows endpoints
- Investigating potential LSASS dump events enterprise-wide
- Searching for signs of Kerberoasting activity
- Detecting use of Mimikatz or equivalent tools
- Conducting a lateral movement hunt using SMB authentication logs
- Analysing use of WMI for remote execution across hosts
- Investigating scheduled task creation in the last 30 days
- Searching for suspicious service installations with unsigned binaries
- Conducting a PowerShell abuse hunt using script block logs
- Identifying Base64 encoded payloads in command lines
- Running a persistence hunt using registry and WMI event data
- Investigating use of Office applications to launch shells
- Searching for evidence of DLL side-loading in critical systems
- Conducting a data exfiltration hunt using network and file events
- Analysing large file transfers to external IPs
- Identifying use of cloud storage apps not in policy
- Running a Linux-specific hunt for suspicious cron jobs
- Detecting brute force SSH attempts across servers
- Investigating sudo abuse by low-privilege users
- Conducting a macOS persistence hunt using launch agent data