• 708.689.0131
  • Contact us
  • Login
Infosec Logo
  • Infosec Logo
  • Products
  • Solutions
  • Resources
  • Company
  • Product overview
  • Infosec IQ logo Security awareness & culture
  • Infosec Skills logo On-demand training & cyber ranges
  • Infosec Skills Live Boot Camps logo On-demand training & cyber ranges
  • Infosec IQ overview
  • Security awareness training
  • Phishing simulator
  • Reporting & assessments
  • Integrations & automation
  • Global administration
  • Browse all training
  • Pricing & features
  • Demo
  • Infosec Skills overview
  • Role-guided training
  • Infosec Skills Teams
  • Cyber ranges & labs
  • Certifications & CPEs
  • Skill assessments
  • Browse all training
  • Pricing & features
  • Book a meeting
  • Live boot camps
  • Infosec Institute certifications
  • DoD 8570 certifications
  • Get team boot camp pricing
  • View boot camp schedule
  • Book a meeting
  • Pre-built training plans
  • Compliance, industry & role-based training
  • Custom education
  • Personalized learning
  • Languages
  • Gamified learning
  • 1000+ phishing templates
  • Simulation types
  • Phishing email reporter
  • Dashboard reports
  • Security culture survey
  • Assessments
  • Learner analytics
  • Learner management
  • Threat response orchestration
  • Integrations
  • 52 NICE Work Roles
  • SOC Analyst
  • Cloud Security Engineer
  • Security Manager
  • ICS Security Practitioner
  • Security Engineer
  • Penetration Tester
  • Digital Forensics Analyst
  • Information Risk Analyst
  • Security Architect
  • Secure Coder
  • Boot camp overview
  • CISSP Boot Camp
  • Security+ Boot Camp
  • Ethical Hacking Boot Camp
  • CCNA Dual Cert Boot Camp
  • CASP+ Boot Camp
  • CCSP Boot Camp
  • CISM Boot Camp
  • CySA+ Boot Camp
  • PMP Boot Camp
  • Browse all boot camps
Choose Your Own Adventure

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing
  • Solutions overview
  • By organization type
  • By need
  • For business teams
  • For government & contractor teams
  • For MSPs & resellers
  • Security awareness
  • Phishing simulation
  • Technical skill development
  • IT certification
  • Compliance & framework
  • CMMC certification

    2021 IT & Security Talent Pipeline Study

    Download Now
    • Cyber Work
    • Webcasts
    • Case studies
    • Reports & whitepapers
    • Blog
    • Community
    • Infosec Inspire
    • Free tools
    • Cyber Work Podcast
    • Cyber Work Applied
    • Infosec Insiders
    • TechExams
    • YouTube
    • LinkedIn
    • Facebook
    • Twitter
    • Phishing Risk Test
    • Security awareness ROI calculator
    • Security awareness training plans
    • Security awareness buyer’s guide

      Cyber Work Podcast

      New cybersecurity career conversations every week

      Listen Now
      • About us
      • Events & webcasts
      • Careers
      • Scholarships & awards
      • Infosec Gives
      • Infosec Gives Partner Program
      • About us
      • Leadership
      • Newsroom
      • Recognition
      • Industry alliances
      • Infosec Hall of Fame
      • Infosec Security Awareness Awards
      • Infosec Accelerate Scholarship Program

        We’re hiring!

        Join a team dedicated to making a difference.

        Get To Know Us

        Cyber Threat Hunting Training Boot Camp

        Learn how to find, assess and remove threats from your organization in our Cyber Threat Hunting Boot Camp designed to prepare you for the Certified Cyber Threat Hunting Professional exam.

        ★★★★☆
        4.26
        (673 ratings)
        View Pricing Book a Boot Camp
        cyber-threat-hunting

        Earn your CCTHP, guaranteed!

        • Three days of expert, live Cyber Threat Hunting training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee

        Hands-on labs

        Hunt cyber threats with our practical exercises that present realistic attack scenarios. Practice threat hunting on our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to hunt down various network- and host-based threats, gather and analyze logs and event data, capture memory dump and search for malware activity. The after-class CTF (Capture The Flag) exercises allow you to put everything you’ve learned together by hunting cyber threats on your own.

        Certification details

        The Certified Cyber Threat Hunting Professional (CCTHP) certification is designed to certify that candidates have expert-level knowledge and skills in cyber threat identification and threat hunting.

        The CCTHP body of knowledge consists of five domains covering the responsibilities of a cyber threat hunter. The certification exam is a 50-question, traditional multiple-choice test. Questions are randomly pulled from a master list and must be completed in two hours. The five CCTHP domains are:

        1. Cyber threat hunting definition and goals
        2. Cyber threat hunting methodologies and techniques
        3. Hunting for network-based cyber threats
        4. Hunting for host-based cyber threats
        5. Cyber threat hunting technologies and tools

        View full course schedule

        Training overview

        The Internet is the new digital frontier, and like any frontier, it has a hundred things waiting to attack you. But sitting quietly and waiting to be jumped isn’t the style of a real professional. Sharpen your skills and learn to hunt the threat on its own turf with Infosec’s Cyber Threat Hunting Boot Camp.

        This immersive three-day course will teach you about the latest tactics and tools used in the fight against hackers and cyber-attackers. Taught by industry professionals who have served as penetration testers, incident responders and computer forensic investigators, the Cyber Threat Hunting Boot Camp covers security analysis, establishing a secure threat-hunting setup, successful hunt patterns and liaising with security operations center personnel to cover all angles of attack while the threat is ongoing.

        What you'll learn

        After attending the Cyber Threat Hunting Boot Camp, you will have the knowledge and skills to:

        • Think tactically regarding cyber threat defense
        • Use threat intelligence to form your own hypotheses and begin the hunt
        • Anticipate and hunt down threats in your organization’s systems
        • Inspect network information to identify dangerous traffic
        • Understand the Hunting Maturity Model to measure your organization’s hunting capability
        • Learn how to find and investigate malware, phishing, lateral movement, data exfiltration and other common threats

        Who should attend

        Understanding the process of threat hunting is useful to any number of different jobs and teams. Our Cyber Threat Hunting Boot Camp would be perfect for anyone who wants to know more about threat hunting and the current threat landscape, such as:

        • Penetration testers
        • Red team members and other white hats
        • Incident-response team members
        • Security analysts
        • Engineers specializing in network security or IT
        • Security consultants and auditors
        • Managers wanting to create threat-hunting teams within their own companies

        Prerequisites

        • Understanding of fundamental information security concepts
        • Working knowledge of networking devices and protocols
        • Exposure to pentesting and network monitoring tools and methodologies
        • Basic knowledge of Linux and Windows command line

        Everything you need to earn your CCTHP

        • Three days of expert, live Cyber Threat Hunting training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee
        Everything you need to earn your CCTHP
        View Pricing

        Exam Pass Guarantee

        We guarantee you’ll pass your exam on the first attempt. Learn more. 

        CCTHP training schedule

        Infosec’s CCTHP training is more than just a boot camp. We support you before, during and after your live training to ensure you’re fully prepared for your exam — and get certified on your first attempt.

        • Before your boot camp
          • Start learning now. You’ll get immediate access to all the content in Infosec Skills so you can prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.

        • During your boot camp
          • Day 1

            Introduction to cyber threat hunting

            • What is threat hunting?
            • Assumption of breach
            • The concept of active defense
            • Role of threat hunting in organizational security program
            • Threat hunting benefits

            Threat hunting process

            • Preparing for the hunt: the hunter, the data, the tools
            • Creating a context-based hypothesis
            • Starting the hunt (confirming the hypothesis)
            • Responding to the attack
            • Lessons learned

            Threat hunting methodologies

            • The Crown Jewel Analysis (CJA)
            • Cyber threat patterns and signatures
            • Utilizing threat intelligence
            • Threat hunting hypotheses: intelligence-driven, awareness-driven, analytics-driven

            Day 2

            Threat hunting techniques

            • Searching
            • Cluster analysis
            • Grouping
            • Stack counting

            Preparing for the hunt

            • What data do you need and how to get it?
            • Host and network visibility
            • Data gathering and analysis tools
            • Commercial and open-source threat hunting solutions

            The hunt is on

            • What threats can be hunted?
            • Introduction to IOCs and artifacts
            • IOCs and IOAs
            • Cyber kill chain

            Day 2 (cont.)

            Hunting for network-based threats

            • Network hunting overview (networking concepts, devices and communications, hunting tools)
            • Hunting for suspicious DNS requests and geographic abnormalities
            • Hunting for DDoS Activity
            • Hunting for suspicious domains, URLs and HTML responses
            • Hunting for irregular traffic: misused protocols,
              port-application mismatches, web shells and other threats

            Hunting for host-based threats

            • Endpoint hunting overview (Windows and Linux processes, file systems, registry, hunting tools)
            • Malware (types, common activities, AV evasion, detection and analysis tools and methods)
            • Hunting for irregularities in processes
            • Hunting for registry and system file changes
            • Hunting for filenames and hashes
            • Hunting for abnormal account activity (brute-force attacks, privileged accounts)
            • Hunting for swells in database read volume
            • Hunting for unexpected patching of systems

            Day 3

            Utilizing system and security event data

            • Event logs and IDs
            • Logging on Windows and Linux
            • SIEM
            • Using event data during hunts

            Advanced threat hunting concepts

            • OODA (Observe, Orient, Decide, Act) loop
            • Going beyond IOCs: hunting for advanced threats
            • Chokepoint monitoring
            • Deceptive technologies
            • Developing an effective threat-hunting program
            • Building customized threat-hunting tools
            • Threat hunting best practices and resources

            CCTHP exam

        • After your boot camp
          • Your boot camp includes a 1-year subscription to Infosec Skills, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.

        Free Cyber Threat Hunting training resources

        Cyber threat hunting: Identify and hunt down intruders

        Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our on-demand webinar series.

        Watch now

        Cyber threat hunting: Identify and hunt down intruders

        On this episode of the CyberSpeak with InfoSec Institute podcast, senior security researcher and InfoSec Institute instructor Jeremy Martin discusses what it takes to be a modern-day threat hunter.

        Learn More

        Top 31 threat-hunting interview questions and answers

        In this article, we will examine the top thirty-one interview questions that could be asked of you as an applicant for the position of threat hunter.

        Get Hired

        Find your boot camp

        Take the course online?
        Learn more about online
        866.471.0059
        • Today
        • Next week
        • Next month
        See additional dates

        Sign up

        Enroll in a boot camp

          See additional dates
          Infosec logo

          Products

          Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps

          Resources

          Cyber Work Blog Infosec Inspire Events & webcasts

          Company

          Contact us About Infosec Careers Newsroom Partners
          • ©2022 Infosec Institute, Inc.
            • Trademarks
            • Privacy Policy

          Infosec, part of Cengage Group

          We use cookies to personalize your experience and optimize site functionality. Accept Cookie settings
          Privacy & Cookies Policy

          Infosec cookie notice

          We use cookies to help understand your needs, optimize website functionality and give you the best experience possible. Use this policy to understand how, when and where cookies are stored on your device. 

          Want to know more? Contact [email protected].
          Necessary
          Always Enabled
          This type of cookie helps keep our website functioning. They provide access to account-based features and other secure areas of our site, and do not store information about you that could be used for marketing. This category of cookies cannot be disabled.
          Analytics
          Google Analytics cookies help us understand how visitors use our site. All data collected from Google Analytics is anonymized (including your IP address) and stored by Google on U.S. servers.
          Marketing
          We use this type of cookie to optimize our marketing campaigns. Marketing cookies are delivered by our database when you visit our site, complete a form or open email from us. Information stored in this cookie includes personal information like your name and what pages you view on our site.
          Save & Accept