← Back to Courses

Advanced Threat Hunting

Proactive defense: Searching for indicators of compromise (IoCs) and APTs that evaded the SOC.

Curriculum

20 Modules
1

The Hunting Loop

Hypothesis-driven hunting vs. IoC matching. The lifecycle of a hunt.

2

MITRE ATT&CK Framework

Mapping adversary behavior to the 14 tactics of the ATT&CK matrix.

3

Hunting in Windows Logs (EVTX)

Security.evtx, System.evtx, and PowerShell logs (4103/4104).

4

Hunting in Network Traffic

Using Zeek (Bro) and RITA to find beacons and long connections.

5

Sysmon Deep Dive

Configuring and analyzing System Monitor logs for process creation and DNS queries.

6

Lateral Movement Detection

Catching PsExec, WMI abuse, and SMB/RPC anomalies.

7

Hunting Web Shells

Finding malicious ASPX/PHP files using file integrity monitoring and log analysis.

8

Privilege Escalation Detection

Identifying Token Manipulation, UAC bypass, and "GetSystem" attempts.

9

Persistence Mechanisms

Hunting for Scheduled Tasks, Registry Run keys, and WMI subscriptions.

10

Memory Hunting with Volatility

Analyzing RAM dumps for unlinked processes and injected code.

11

Hunting Malware (YARA)

Writing YARA rules to scan files and memory for malware families.

12

Data Exfiltration Hunting

Detecting large data transfers, DNS tunneling, and cloud storage uploads.

13

Hunting in AWS/Cloud

CloudTrail analysis: Finding compromised IAM keys and S3 bucket access.

14

Active Directory Hunting

Detecting DCSync, Golden Ticket, and Kerberoasting attacks.

15

Living off the Land (LotL)

Detecting abuse of native tools: certutil, bitsadmin, regsvr32.

16

Elastic Stack for Hunters

Using Kibana (KQL) to visualize and hunt through massive datasets.

17

Sigma Rules

Writing generic detection rules that work across Splunk, ELK, and QRadar.

18

Beacon Analysis

Mathematical analysis of connection timing to find C2 channels (Jitter/Interval).

19

Insider Threat Hunting

Detecting anomalous user behavior and unauthorized access.

20

The Hunter's Capstone

Full-spectrum hunt in a simulated compromised enterprise environment.

Course Info

~600 Minutes
20 Modules
Start Learning