Why Choose Us?

  • Best Seller

  • Online Courses

  • 24/7 Support

  • Lifetime Access

  • Get Certificate

Cybersecurity Threat Hunting for SOC Analysts

Gain practical skills in detecting and neutralizing threats before they cause damage. This course equips SOC analysts with hands-on techniques to proactively hunt cyber threats using real-world tools and methodologies.

  • Learn the fundamentals of threat hunting and its role in modern SOC operations

  • Master IOC (Indicators of Compromise) analysis and detection methods

  • Use SIEM tools for proactive threat detection and correlation

  • Analyze logs, events, and network activity for hidden threats

  • Practice real-world threat hunting scenarios and case studies

  • Improve incident response and reduce detection time

Offer curriculum

    1. 1. Download VMWare Workstation Pro

    2. 2. Install VMWare Workstation Pro

    3. 3. Download Kali Linux VM

    4. 4. Install Kali Linux VM

    5. 5. Configure Kali Linux VM pimpmykali.sh

    6. 6. Configure Kali Linux VM TMUX

    7. 7. Configure Kali Linux VM Odds and Ends

    1. 1. Active Countermeasures Malware of the Day

    2. 2. Malware Traffic Analysis

    1. 1. Wireshark

    2. 2. tshark

    3. 3. tcpdump

    4. 4. ngrep

    5. 5. capinfos

    6. 6. RITA Installing MongoDB

    7. 7. RITA Building RITA from Source

    8. 8. zeek

    9. 9. Using zeek _ Rita to find Evil!

    1. 1. Understanding the New Adversary

    2. 2. The Broken Threat Hunting Mindset

    3. 3. The Modern Threat Hunting Mindset

    4. 4. Beaconing Basics

    5. 5. Beaconing DNS

    6. 6. Beaconing CDN

    7. 7. Beaconing Detection Timing

    8. 8. Beaconing Detection Session Size Analysis

    1. 1. Finding Beacons Long and Cumulative Connections

    2. 2. Finding Beacons Business Need Analysis (Part 1)

    3. 3. Finding Beacons Business Need Analysis (Part 2)

    4. 4. Finding Beacons Business Need Analysis (Part 3)

    5. 5. Finding Beacons Business Need Analysis (Part 4)

    6. 6. Finding Beacons Unexpected app on Standard Port

    7. 7. Finding Beacons Unexpected Protocol Behavior

    8. 8. Finding Beacons Destination IP Reputation Check

    9. 9. Finding Beacons Internal Endpoint Investigation

    1. 1. Suricata Capabilities _ Installation!

    2. 2. Suricata vs RITA Zeus Malware

    3. 3. Suricata vs RITA Powershell Empire

About this course

  • $69.00
  • 64 lessons
  • 8.5 hours of video content

Discover your potential, starting today

Hurry! This Exclusive Deal Ends In

Don’t miss out on this opportunity to upskill with Learn Ezy!

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Get In Touch

Add your email to the mailing list to get the latest updates.

Thank You