HUNT Certification – Windows

HUNT Certification – Windows is the first of three courses in R9B’s HUNT Certification program. R9B designed this course to train cybersecurity professionals to actively defend critical Windows systems. The course exposes students to a “think like the adversary” mindset to actively detect sophisticated and tailored adversary attacks. This course prepares cybersecurity professionals to HUNT within their network for evidence of adversary presence not previously detected by automated enterprise security devices and software.

Rather than simply reacting to network attacks, students learn methods to proactively and remotely interrogate systems and analyze data. This empowers the students to proactively identify systems targeted by an adversary. Students learn how to identify malicious code, evidence of adversary presence, and lateral movement within a network. Throughout the program, instructors share their experience in cybersecurity, operations, and tool development. This provides students an appreciation of the challenges they face in countering the cyber adversary.

The HUNT Certification – Windows course begins with the concepts of real-time detection and identification of adversary attacks. Instructors expose students to advanced Windows operating system concepts, with emphasis on adversary file manipulation and persistence techniques used to bypass cybersecurity systems and infrastructure. Follow-on training courses in R9B’s HUNT series focus on Linux- and network-based methodologies and operations.

The HUNT Certification – Windows course begins with the concepts of real-time detection and identification of adversary attacks. Instructors expose students to advanced Windows operating system concepts, with emphasis on adversary file manipulation and persistence techniques used to bypass cybersecurity systems and infrastructure. Follow-on training courses in R9B’s HUNT series focus on Linux- and network-based methodologies and operations.

STUDENT PREREQUISITES:

Basic understanding of computers.

INTENDED AUDIENCE:

This class is intended for individuals with intermediate to advanced knowledge of information systems and systems security. Some experience with command line tools is desired but not mandatory.

COURSE MATERIALS PROVIDED:

• Lecture slides in PDF format
• Exercise materials (e.g., files, VMs)
• Course reference material

PRICE:

$4,600 per student

• NOVEMBER 26, 2018 - (COLORADO SPRINGS, CO)
• DECEMBER 3, 2018 - (HONOLULU, HI)
• JANUARY 14, 2019 - (ANNAPOLIS JUNCTION, MD)
• FEBRUARY 11, 2019 - (COLORADO SPRINGS, CO)
• MARCH 4, 2019 - (SAN ANTONIO, TX)
• APRIL 8, 2019 - (SAN ANTONIO, TX)
• APRIL 8, 2019 - (COLORADO SPRINGS, CO)
• MAY 6, 2019 - (ANNAPOLIS JUNCTION, MD)
• MAY 20, 2019 - (COLORADO SPRINGS, CO)
• JUNE 17, 2019 - (COLORADO SPRINGS, CO)
• JULY 8, 2019 - (SAN ANTONIO, TX)
• AUGUST 12, 2019 - (COLORADO SPRINGS, CO)
• SEPTEMBER 16, 2019 - (COLORADO SPRINGS, CO)
• NOVEMBER 4, 2019 - (HONOLULU, HI)
• DECEMBER 9, 2019 - (SAN ANTONIO, TX)

Enroll Today

Human-Led. Technology-Accelerated.

Email Call 719.368.3677

THE LEADERS IN HUNT

Securing the commercial sector since 2013