
Master the art of threat hunting and incident response with Velociraptor, a rapidly emerging powerhouse in cybersecurity.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date: WWHF Deadwood 2025 - Link at bottom.
Description
Master the art of threat hunting and incident response with Velociraptor, a rapidly emerging powerhouse in cybersecurity.
This hands-on course, led by industry experts Eric Capuano and Whitney Champion, goes beyond the basics—unlocking Velociraptor’s full potential for rapid triage, deep forensic analysis, and proactive threat detection. Through immersive labs and real-world attack simulations, you’ll learn to craft custom queries, isolate compromised systems, and contain threats with precision. Dive into advanced features and customization, ensuring Velociraptor fits seamlessly into your security operations. Whether you’re refining your existing skills or exploring new strategies, this course equips you with immediately applicable expertise to stay ahead of evolving threats.
System Requirements
-
Hardware Requirements
- Any computer with a web browser will suffice, even a Chromebook. All lab VMs are hosted in the cloud.
Syllabus
Course Learning Objectives:
Upon successful completion of this course, students will be able to:
-
- Deploy and configure Velociraptor in various environments, including local and cloud-based deployments
-
- Utilize Velociraptor for proactive threat hunting and real-time incident response
-
- Execute custom Velociraptor Query Language (VQL) queries to collect forensic artifacts and analyze endpoint data
-
- Automate detection, triage, and remediation workflows to streamline incident response operations
-
- Conduct deep forensic investigations, including persistence analysis, binary hunting, and network anomaly detection
-
- Leverage advanced Velociraptor features such as scheduled hunts, telemetry streaming, and automated labeling
Course Outline
Section 1: Getting Started with Velociraptor
-
- Introduction to Velociraptor (Lecture)
-
- Overview of Velociraptor’s capabilities and architecture
-
- Understanding the server-client model
-
- Introduction to Velociraptor (Lecture)
-
- Deploying a Velociraptor Server (Lecture)
-
- Local deployment on WSL
-
- Cloud deployment options (AWS, self-hosted)
-
- Deploying a Velociraptor Server (Lecture)
-
- Deploying Velociraptor Clients (Lecture)
-
- Methods for deploying endpoint agents (EXE vs. MSI)
-
- Automating agent deployment at scale
-
- Deploying Velociraptor Clients (Lecture)
-
- Introduction to the Velociraptor GUI (Lecture)
-
- Navigating the interface
-
- Executing queries and analyzing results
-
- Introduction to the Velociraptor GUI (Lecture)
🔬 Lab 1.0 – Deploying Local Velociraptor Server on WSL
🔬 Lab 1.0b (Optional) – Deploying Cloud Hosted Velociraptor Server
🔬 Lab 1.1 – Prepare to Collect Volatile Data
🔬 Lab 1.2 – Build and Deploy Client MSI
🔬 Lab 1.3 (Optional) – Building Custom MSIs
Section 2: Working with Artifacts and Notebooks
-
- Understanding Velociraptor Artifacts (Lecture)
-
- Client vs. Server artifacts
-
- How artifacts facilitate data collection and automation
-
- Understanding Velociraptor Artifacts (Lecture)
-
- Using Notebooks for Analysis (Lecture)
-
- Creating and modifying notebooks
-
- Automating data correlation with VQL
-
- Using Notebooks for Analysis (Lecture)
Section 3: Advanced Data Collection & Threat Hunting
-
- Manual and Automated Binary Deployments (Lecture)
-
- Deploying security tools (Sysmon, EDR) via Velociraptor
-
- Automating deployments with hunts and real-time monitoring
-
- Manual and Automated Binary Deployments (Lecture)
-
- Real-time Eventing & Telemetry Streaming (Lecture)
-
- Leveraging event-based artifacts for proactive monitoring
-
- Using Windows ETW and Sysmon forwarding
-
- Real-time Eventing & Telemetry Streaming (Lecture)
-
- Scheduling Hunts and Automating Detection (Lecture)
-
- Setting up scheduled hunts for continuous monitoring
-
- Integrating Velociraptor with existing security workflows
-
- Scheduling Hunts and Automating Detection (Lecture)
-
- Auto-labeling Systems for Efficient Investigations (Lecture)
-
- Automating endpoint classification based on behavioral data
-
- Auto-labeling Systems for Efficient Investigations (Lecture)
🔬 Lab 3.1 – Deploy Sysmon
🔬 Lab 3.2 – Enable Eventing & Telemetry Streaming
🔬 Lab 3.3 (Optional, Recommended) – Deploy LimaCharlie EDR
🔬 Lab 3.4 (Optional) – Critical Service Deployment & Monitoring
🔬 Lab 3.5 (Optional) – Scheduled Hunts
🔬 Lab 3.6 (Optional) – Pushing Client Data to a CMDB
🔬 Lab 3.7 – Auto Labeling Systems
Section 4: Incident Response and Forensic Analysis
-
- Stacking Analysis & Baselining Systems (Lecture)
-
- Identifying anomalies in processes, network connections, and services
-
- Stacking Analysis & Baselining Systems (Lecture)
-
- Real-time Event & Telemetry Analysis (Lecture)
-
- Analyzing Sysmon logs, ETW events, and DNS queries in real-time
-
- Real-time Event & Telemetry Analysis (Lecture)
-
- Analyzing Event Logs with Sigma (Lecture)
-
- Running Sigma rules for historical and real-time threat detection
-
- Analyzing Event Logs with Sigma (Lecture)
-
- Scoping an Intrusion (Lecture)
-
- Using artifacts to identify compromised hosts
-
- Correlating known indicators of compromise (IOCs)
-
- Scoping an Intrusion (Lecture)
-
- Deep Forensic Investigation (Lecture)
-
- Analyzing process execution timelines
-
- Identifying persistence mechanisms
-
- Uncovering untrusted binaries and malware
-
- Deep Forensic Investigation (Lecture)
-
- Hunting Covert C2 Beacons (Lecture)
-
- Using YARA rules for in-memory malware detection
-
- Hunting Covert C2 Beacons (Lecture)
-
- Eradication & Remediation (Lecture)
-
- Removing persistence mechanisms and active threats
-
- Ensuring complete containment and recovery
-
- Eradication & Remediation (Lecture)
🔬 Lab 4.1 – Stacking Analysis with Notebooks
🔬 Lab 4.2 – Real-time Event & Telemetry Analysis
🔬 Lab 4.3 – Analyzing Event Logs with Sigma
🔬 Lab 4.4 – Initial Scoping
🔬 Lab 4.5 – Process & Network Analysis
🔬 Lab 4.6 – Binary Presence & Evidence of Execution
🔬 Lab 4.7 – Finding Persistence
🔬 Lab 4.8 – Malware Discovery
🔬 Lab 4.9 (Optional) – Identifying Initial Access
🔬 Lab 4.10 – Hunting Covert C2 Beacons
🔬 Lab 4.11 – Eradication
Section 5: Additional Considerations & Deprovisioning
-
- Hardening Velociraptor Deployments (Lecture)
-
- Implementing authentication, encryption, and secure configurations
-
- Hardening Velociraptor Deployments (Lecture)
-
- Deprovisioning & Cleanup (Lecture)
-
- Removing lab infrastructure (optional for cloud users)
-
- Deprovisioning & Cleanup (Lecture)
🔬 Lab 5.0 (Optional) – Deprovision Cloud Resources
FAQ
Get an overview of Velociraptor's architecture and capabilities. Learn how to set up and configure Velociraptor in various environments to maximize its effectiveness.
Effective Threat Hunting Techniques
Discover how to proactively search for indicators of compromise using Velociraptor. Learn how to craft and execute custom queries to detect suspicious activity across multiple endpoints.
Incident Response Workflow
Develop a comprehensive incident response strategy leveraging Velociraptor’s powerful features. Learn to quickly triage and isolate compromised systems, collect critical forensic data, and contain active threats.
Advanced Features and Customization
Explore the latest enhancements to Velociraptor that nearly double its potential as an IR tool. Understand how to customize and extend Velociraptor to fit your specific organizational needs.
Real-World Scenarios and Hands-On Labs
Engage in practical exercises that simulate real-world attacks. Apply what you’ve learned to identify, analyze, and respond to complex threats using Velociraptor in a controlled environment.
Familiarity with cybersecurity fundamentals such as the MITRE ATT&CK framework and common attack techniques
Experience with SIEMs, EDR tools, or forensic analysis platforms is helpful but not required
Some exposure to YARA, Sigma, or query-based data analysis is useful but will be covered in class
Optional Pre-Class Materials:
To get the most out of this course, students can explore:
The Velociraptor Documentation (docs.velociraptor.app) for an overview of its capabilities
Introduction to Velociraptor Query Language (VQL) from the official Velociraptor resources for those wanting a head start on custom queries
This course provides everything needed to learn Velociraptor from the ground up, but having the above knowledge will help students maximize their learning experience.
About the Instructors

Eric Capuano
Bio
Eric Capuano is a Director at LimaCharlie and a SANS DFIR Instructor with over a decade of experience in Security Operations, Digital Forensics, and Incident Response. He began his Information Security career as a Tactics Developer for the United States Air Force, later transitioning to Cyber Warfare Operations. After his military service, Eric led cybersecurity operations across private and government sectors, including serving as CTO of Recon Infosec, a company he founded to deliver enterprise-grade security to organizations of all sizes. In 2016, he developed OpenSOC, a blue team CTF that has trained thousands of SOC and IR professionals worldwide. Eric also managed the Security Operations Center for the Texas Department of Public Safety, where he established the agency’s first CSIRT. In his spare time, Eric shares technical training labs on his blog at
https://blog.ecapuano.com
His certifications include GIAC, GCFE, GCFA, CEH, Security+, Linux+, LPIC-1, PCNSE, and A+.
Whitney Champion
Bio
Whitney is the lead solutions architect at LimaCharlie and a co-founder and former lead architect of Recon InfoSec. She is a seasoned security architect and engineer with over 15 years of experience in designing and automating large-scale security infrastructure. She began her journey as a web and flash developer and sysadmin in the 90s and early 2000s, and after college became a security analyst for the Navy. Her work spans across building advanced security platforms, managing complex multi-environment deployments, and architecting comprehensive solutions that integrate cutting-edge tools and technologies. This includes building, automating, and maintaining the range environments and platforms used to drive and support our trainings. With extensive experience in both the private and public sectors, she excels at automating and orchestrating massive environments and streamlining security operations. Whitney’s passion for security and infrastructure drives her to continuously innovate and enhance the efficiency of security teams and operations. Her certifications include RHCA, RHCE, RHCVA, CISSP, CEH, Security+, Linux+, among others.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2025.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive
Workshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Practical IT Fundamentals with Zach Hill
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: Foundational Application Security Training with Bill McCauley
View Course This product has multiple variants. The options may be chosen on the product page