Join us at the Blue Team Summit! Register Here

Advanced Network Threat Hunting with Chris Brenton

Course Authored by .

This course builds on our one-day network threat hunting program by providing extensive hands-on lab sessions. Participants will analyze PCAP files to identify Command and Control (C2) communications and develop customized threat hunting runbooks.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This course builds on our one-day network threat hunting program by providing extensive hands-on lab sessions. Participants will analyze PCAP files to identify Command and Control (C2) communications and develop customized threat hunting runbooks.

So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course!

We will spend most of this class analyzing PCAP files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.

About the Instructor

Pixel splash background
Chris Brenton
Chris Brenton
"Network threat hunting advocate"
Bio

Chris has been a leader in the IT and security industry for over 25 years. He’s a published author of multiple security books and was the primary author of the Cloud Security Alliance’s original online training courses. As a Fellow Instructor, Chris developed and delivered multiple courses for the SANS Institute and now teaches multiple courses through Antisyphon Training.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.