Course Outline
                                
                                    1 - Course Outline
                                        
                                                - Threat Hunting Theory 
 
                                                - Threat Hunting Concepts, Frameworks, and Threat Models 
 
                                                - Threat Hunting Process Fundamentals  
 
                                                - Threat Hunting Methodologies and Procedures 
 
                                                - Network-Based Threat Hunting 
 
                                                - Endpoint-Based Threat Hunting 
 
                                                - Endpoint-Based Threat Detection Development 
 
                                                - Threat Hunting with Cisco Tools 
 
                                                - Threat Hunting Investigation Summary: A Practical Approach 
 
                                                - Reporting the Aftermath of a Threat Hunt Investigation
 
                                        
                                 
                     
                    
                        Target Audience
                                    Security Operations Center staff 
Security Operations Center (SOC) Tier 2 Analysts 
Threat Hunters 
Cyber Threat Analysts 
Threat Managers 
Risk Managements