Course / Course Details

Cyber Defense & Threat Hunting

  • Elias Mucacu image

    By - Elias Mucacu

  • 0 students
  • N/A
  • (0)

Course Requirements

  • Completion of Cybersecurity Operations & Monitoring or equivalent experience.

  • Familiarity with SIEM tools, incident detection, and network defense.

  • Access to a SOC lab or simulation environment.

  • Course Description

    This advanced course trains learners to proactively detect, analyze, and mitigate cyber threats using modern threat intelligence and security operations techniques. Students will explore SOC operations, attack surface management, and advanced adversary detection methods while using real-world tools and frameworks.

    Course Outcomes

    By the end of this course, learners will be able to:

    1. Apply threat intelligence to identify and prioritize potential cyber threats.

    2. Conduct proactive threat hunting using data from SIEM systems.

    3. Analyze attacker tactics, techniques, and procedures (TTPs) using MITRE ATT&CK.

    4. Implement continuous monitoring and attack surface reduction strategies.

    5. Document and communicate findings to enhance SOC readiness and defense posture.

    Course Curriculum

    • 0 chapters
    • 0 lectures
    • 0 quizzes
    • N/A total length
    Toggle all chapters

    Instructor

    Elias Mucacu

    Elias Mucacu is an accomplished cybersecurity professional and instructor with extensive experience in the fields of information security, network defense, and digital forensics. With a strong background in ICT management and hands-on expertise in implementing cybersecurity frameworks, Elias has trained professionals and students across various sectors, empowering them with practical skills to identify, prevent, and respond to evolving cyber threats.

    0 Rating
    0 Reviews
    2 Students
    12 Courses

    Course Full Rating

    0

    Course Rating
    (0)
    (0)
    (0)
    (0)
    (0)

    No Review found

    Sign In or Sign Up as student to post a review

    Student Feedback

    Course you might like

    Technical Core (Intermediate)
    Cybersecurity Operations & Monitoring
    0 (0 Rating)
    This course focuses on the daily functions of a Security Operations Center (SOC), emphasizing log management, SIEM syste...

    You must be enrolled to ask a question

    Students also bought

    More Courses by Author

    Discover Additional Learning Opportunities