Red Team Summit CFP now open! Register Here
Shopping Cart

No products in the cart.

Threat Hunting & Incident Response with Velociraptor with Eric Capuano & Whitney Champion

Threat Hunting & Incident Response with Velociraptor with Eric Capuano & Whitney Champion

Overview

  • Course Length: 16 hours
  • Support from expert instructors
  • Includes a certificate of completion
  • 12 months access to Cyber Range
Instructors:
and

This in-depth, hands-on course is designed to unlock the full potential of Velociraptor, transforming it from a useful tool into an indispensable part of your cybersecurity arsenal.

Velociraptor is rapidly gaining recognition as a powerful tool for incident response and threat hunting, yet many cybersecurity practitioners have only scratched the surface of its capabilities.

Over the course of this immersive training, led by industry experts Eric Capuano and Whitney Champion, you will learn how to harness the latest features of Velociraptor to conduct effective threat hunting and incident response. The course will cover a broad spectrum of use cases, from rapid triage of systems to deep-dive forensic analysis, providing you with practical skills that can be immediately applied in real-world scenarios.

Key Course Features:

  • Cloud-native Lab: our virtual machines are cloud hosted allowing anyone to participate in the hands-on component without worrying about running virtual machines on their PC.
    • Participants keep the lab guides forever and maintain access to their cloud-hosted lab VMs for 2 weeks after the course.
  • Hands-on Threat Hunting: Learn to proactively search for hidden threats using advanced techniques and tools used by professional threat hunters.
  • Advanced Detection Methodologies: Master the latest detection methodologies to identify sophisticated threats that evade traditional security measures.
  • Tool Proficiency: Gain expertise in using Velociraptor’s most advanced features for threat hunting and incident response at scale.
  • Threat Intelligence Integration: Learn how to effectively leverage threat intelligence to enhance your hunting capabilities.
  • Incident Response Integration: Understand how threat hunting fits into the broader incident response process and how to seamlessly transition from hunting to response.

By the end of this course, attendees will be equipped with the knowledge and practical skills to conduct effective threat hunts, significantly improving their organization’s security posture and ability to detect and respond to advanced threats.

Wild West Hackin’ Fest at Mile High (Feb 4th – Feb 5th, 2025) – Denver, CO

  • February 4th – 8:30 AM to 5:00 PM MDT
  • February 5th – 8:30 AM to 5:00 PM MDT
Instructors:

Eric Capuano

Whitney Champion

Key Objectives

  • Leverage Velociraptor to identify compromised, in-scope endpoints and perform deep-dive analysis.
  • Learn to identify and remediate malicious persistence mechanisms, suspicious processes and command & control network activity
  • Deploy real-time detection capabilities leveraging the Sigma detection ruleset.
  • Develop a deep understanding of the threat hunting process and its importance in modern cybersecurity.
  • Learn to create and implement effective threat hunting hypotheses.
  • Master techniques for identifying Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) used by advanced adversaries.
  • Enhance skills in log analysis, network traffic analysis, and endpoint investigation.
  • Understand how to use automation to scale threat hunting efforts.
  • Learn best practices for documenting and reporting threat hunting findings.

Who Should Attend?

This course is ideal for security analysts, SOC team members, incident responders, and cybersecurity professionals looking to enhance their threat hunting skills. Participants should have a basic understanding of networking, security concepts, and familiarity with common security tools.

This class is being taught at Wild West Hackin’ Fest at Mile High 2025.

For more information about our conferences, visit Wild West Hackin’ Fest!

Clicking on the button above will take you
to our registration page on the website.

Course Categories:

Incident Response, Threat Hunting