HUNT Certification – Network

R9B designed the third course in the HUNT Certification program to train cybersecurity professionals to collect and analyze data from a network beyond single node analysis. This five-day advanced course exposes students to a “think like the adversary” mindset in order to actively pursue and detect adversary activity targeting network-based systems and infrastructure. When combined with the other two phases, this course prepares cybersecurity professionals for the R9B HUNT Certification. The course enables cybersecurity professionals to HUNT within network systems and infrastructure for evidence of adversary presence undetected by automated security devices and software.

This phase of the HUNT training program begins with remote identification of infrastructure devices and supporting systems in the network. The course develops a plan to perform systematic remote interrogation, analytics, and adversary pursuit. The goal of the course is to provide knowledge to conduct remote interactive HUNT operations to determine if a breach has occurred and define appropriate mechanisms for analysis and mitigation.

Students collect, normalize, visualize and analyze data across a network from various sources. This course focuses on capturing the adversary’s ability to compromise a network, conduct lateral movement, establish command and control, tunnel, and exfiltrate data. Students identify covert communications, malicious activity, and other network data anomalies. Instructors use various open source and custom-developed remote interrogation techniques to analyze networking devices and supporting systems to include logging and alerts. Instructors present students with real-world situations and enable them to perform HUNT operations across a corporate network.

Phases one and two of the R9B HUNT training program focus on Windows- and Linux-based HUNT methodologies and operations.

Students collect, normalize, visualize and analyze data across a network from various sources. This course focuses on capturing the adversary’s ability to compromise a network, conduct lateral movement, establish command and control, tunnel, and exfiltrate data. Students identify covert communications, malicious activity, and other network data anomalies. Instructors use various open source and custom-developed remote interrogation techniques to analyze networking devices and supporting systems to include logging and alerts. Instructors present students with real-world situations and enable them to perform HUNT operations across a corporate network.

Phases one and two of the R9B HUNT training program focus on Windows- and Linux-based HUNT methodologies and operations.

STUDENT PREREQUISITES:

Basic understanding of computers.

INTENDED AUDIENCE:

This class is intended for individuals with intermediate to advanced knowledge of information systems and systems security. Some experience with command line tools is desired but not mandatory.

COURSE MATERIALS PROVIDED:

• Lecture slides in PDF format
• Exercise materials (e.g., files, VMs)
• Course reference material

PRICE:

$4,600
CONTACT FOR GOVERNMENT PRICING

• DECEMBER 10, 2018 - (COLORADO SPRINGS, CO)
• DECEMBER 17, 2018 - (HONOLULU, HI)
• FEBRUARY 4, 2019 - (ANNAPOLIS JUNCTION, MD)
• FEBRUARY 25, 2019 - (COLORADO SPRINGS, CO)
• MARCH 11, 2019 - (SAN ANTONIO, TX)
• APRIL 15, 2019 - (COLORADO SPRINGS, CO)
• JUNE 10, 2019 - (COLORADO SPRINGS, CO)
• JULY 8, 2019 - (ANNAPOLIS JUNCTION, MD)
• JULY 15, 2019 - (SAN ANTONIO, TX)
• AUGUST 26, 2019 - (COLORADO SPRINGS, CO)
• NOVEMBER 18, 2019 - (HONOLULU, HI)
• DECEMBER 16, 2019 - (SAN ANTONIO, TX)

Enroll Today

Human-Led. Technology-Accelerated.

Email Call 719.368.3677

THE LEADERS IN HUNT

Securing the commercial sector since 2013