Threat Hunting Courses, Certifications and Workshops
Learn cyber defense capabilities to search for and defeat concealed cyber adversaries that have evaded, avoided and bypassed security defences

SIEM Tactics Bootcamp
The bootcamp teaches students how to defend computer networks using a SIEM. This is achieved by providing instruction on how to use Elasticsearch and Kibana.
Elasticsearch is a search engine that is used for monitoring and analyzing data. Kibana is a visualization tool that helps individuals create dashboards and work with data sets. Together, these two tools can detect cyber intrusions and help incident response teams deal with major breaches.
Read MoreTARGET AUDIENCE
- Blue Teamer
- Cyber Defense Analyst
- Incident Responder

Threat Hunting Master Course
This Master Course teaches a unique approach to threat hunting based on data science, active deception and the development of custom intrusion detection tools.
You will learn how to hunt for concealed threat actors that target large scale computer networks.
Detailed step-by-step instructions will be given, and students will leave this course with practical skills to hunt for attackers on their networks, or their clients’ networks.
Read MoreTARGET AUDIENCE
- Security Analyst
- Incident Responder
- Threat Hunter
- Cyber Defender
- Forensics Analyst

MBT - Certified Blue Teamer
Malware analysis, threat hunting, threat intelligence, digital forensics, incident response, and cyber defence are all tasks that an MCSI qualified professional Blue Teamer can perform for the SOC.
This certification course will teach you how to deploy and manage incident mitigation techniques and technologies, as well as how to detect and contain intrusions, analyse suspicious binaries, and discover hidden cyber enemies.
Read MoreTARGET AUDIENCE
- Security Analyst
- Incident Responder
- Threat Hunter
- Cyber Defender

MTH - Certified Threat Hunter
Threat hunting engagements in large-scale Windows networks can be delivered by an MCSI certified professional Threat Hunter.
This certification course will teach you how to acquire digital forensics artefacts at scale and how to seek for hidden cyber adversaries using Python and YARA.
You'll learn how to use a methodical approach to Threat Hunting, including how to deliver engagements and reports.
Read MoreTARGET AUDIENCE
- Security Analyst
- Incident Responder
- Threat Hunter
- Cyber Defender