Network Threat Hunting Course

Detect, Hunt & Mitigate Cyber Threats
Review network threats and learn the techniques security teams use to strategically hunt and mitigate them.
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOURS | CPE CREDITS: 1 | FOCUS AREA: SECURITY OPERATIONS | PROFICIENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Product Details
This course explores why proactive security operations require a comprehensive approach to identifying threats and safeguarding assets. Learners will gain a better understanding of the tactics, techniques and procedures used by attackers to breach networks. They will also consider the tools and techniques security teams use when creating an effective strategy for hunting threats and applying security measures and mitigations to counter them.
Learning Experience:
- Text and video-based content
- Case study learning activity
- Check your understanding questions
- Assessment
- Validation of Completion
- 24/7/365 technical support
Who Will Benefit
This course is designed for security professionals seeking to explore or learn more about how fundamental threat identification and handling concepts relate to broader cybersecurity strategy. Prior experience and familiarity with security operations and cybersecurity principles are helpful and recommended but not required.
Key Topics
- Threats and mitigation
- Network security
- Security operations
Learning Outcomes
- Recognize the most common types of network threats
- Differentiate penetration testing from network threat hunting
- Determine fundamental security practices around advanced persistent threats
- Identify and apply security measures and mitigation strategies to counter advanced persistent threats
Benefits
- Learn how fundamental threat identification and handling concepts relate to broader cybersecurity strategy
- Participate in activities centered on real-world applications
- Earn CPE credits
Program Completion
Learners have 60 days from the date of purchase to complete the entire course. Those who successfully complete this course will receive a digital Validation of Completion and earn continuing professional education (CPE) credits. We recommend that you download and retain the Validation of Completion for your personal records.
To receive a Validation of Completion and earn CPE credits, learners must:- Complete the learning experience
- Pass the assessment
- Complete the learning experience evaluation
Credit Info
CPE Credits | Group A | 1 |
Field of Study | Security Operations | |
Level | Intermediate | |
Prerequisites | Prior experience and familiarity with security operations and cybersecurity principles are helpful and recommended but not required. | |
Access | Online | This is a digital product. The content will be available up to 60 days after purchase date. |
For more information, please refer to the ISC2 Certification Maintenance Handbook for additional CPE requirement details.
CPE Credit Reporting
CPE credits earned from this learning experience will automatically be reported for ISC2 credentials on the first day of every month. Please allow up to 10 business days for processing.
CPE credits earned for this learning experience may also be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
For questions related to ISC2 CPE credits or the CPE portal not covered in the handbook, please contact us via our online form.
Group Ordering for Your Team
To purchase this course for someone or inquire about team discounts, please contact your regional office:
Americas +1.866.331.4722 teamtraining@isc2.org |
EMEA +44.203.960.7800 teamtraining@isc2.org |
Asia-Pacific +852.5803.5662 teamtraining@isc2.org |
Delivery
A stable internet connection is required. To record your completion of the online learning experience, please ensure you are connected to the internet at all times.
Cancellation Policy
Refunds are not provided for ISC2 learning experiences.
Related Content

Threat Handling Foundations Certificate
Learn More
Building a Digital Forensics and Incident Response (DFIR) Program
Learn More
Foundations of Digital Forensics
Learn More
Incident Management: Preparation and Response Course
Learn More
Responding to a Breach Course
Learn More