HUNT Certification – Windows

HUNT Certification – Windows is the first of three cyber threat hunting training courses in R9B’s HUNT Certification program. R9B designed this course to train cybersecurity professionals to actively defend critical Windows systems. The course exposes students to a “think like the adversary” mindset to actively detect sophisticated and tailored adversary attacks. This course prepares cybersecurity professionals to HUNT within their network for evidence of adversary presence not previously detected by automated enterprise security devices and software.

Rather than simply reacting to network attacks, students of this cyber threat hunting training learn methods to proactively and remotely interrogate systems and analyze data. This empowers the students to proactively identify systems targeted by an adversary. Students learn how to identify malicious code, evidence of adversary presence, and lateral movement within a network. Throughout the program, instructors share their experience in cybersecurity, operations, and tool development. This provides students an appreciation of the challenges they face in countering the cyber adversary.

The HUNT Certification – Windows cyber threat hunting training course begins with the concepts of real-time detection and identification of adversary attacks. Instructors expose students to advanced Windows operating system concepts, with emphasis on adversary file manipulation and persistence techniques used to bypass cybersecurity systems and infrastructure. Follow-on training courses in R9B’s HUNT series focus on Linux- and network-based methodologies and operations.

The HUNT Certification – Windows course begins with the concepts of real-time detection and identification of adversary attacks. Instructors expose students to advanced Windows operating system concepts, with emphasis on adversary file manipulation and persistence techniques used to bypass cybersecurity systems and infrastructure. Follow-on training courses in R9B’s HUNT series focus on Linux- and network-based methodologies and operations.

STUDENT PREREQUISITES:

Basic understanding of computers.

INTENDED AUDIENCE:

This cyber threat hunting training class is intended for individuals with intermediate to advanced knowledge of information systems and systems security. Some experience with command line tools is desired but not mandatory.

COURSE MATERIALS PROVIDED:

• Lecture slides in PDF format
• Exercise materials (e.g., files, VMs)
• Course reference material

PRICE:

$4,600 per student

May
20
Mon
HUNT Certification – Windows (Colorado Springs, CO)
May 20 – May 24 all-day
Jun
17
Mon
HUNT Certification – Windows (Colorado Springs, CO)
Jun 17 – Jun 21 all-day
Jul
8
Mon
HUNT Certification – Windows (San Antonio, TX)
Jul 8 – Jul 12 all-day
Aug
12
Mon
HUNT Certification – Windows (Colorado Springs, CO)
Aug 12 – Aug 16 all-day
Sep
16
Mon
HUNT Certification – Windows (Colorado Springs, CO)
Sep 16 – Sep 20 all-day
Nov
4
Mon
HUNT Certification – Windows (Honolulu, HI)
Nov 4 – Nov 8 all-day
Dec
9
Mon
HUNT Certification – Windows (San Antonio, TX)
Dec 9 – Dec 13 all-day

Human-Led. Technology-Accelerated.

Email Call 719.368.3677 (M-F 8-5)