CTH100 Cyber Threat Hunting
Self-paced
Sorry! The enrollment period is currently closed. Please check back soon.
Full course description
Cyber Threat Hunting – RapidAscent
In today’s cybersecurity landscape, reacting to alerts is no longer enough. This hands-on course trains learners to proactively hunt for adversaries inside enterprise systems before they cause damage. Through guided labs, real-world data sets, and a team-based capstone, students will master techniques used by elite cyber defenders.
You'll explore how adversaries operate, learn to use threat intelligence to shape hypotheses, and apply investigative skills across both Windows and Linux environments. From terminal commands to SIEM log analysis, this course takes you from theory to threat-hunting operations.
Whether you're new to cybersecurity or sharpening your blue team skills, this course prepares you to step into the role of threat hunter—armed with the mindset and tools to make a difference.
By completing this course, learners will:
-
Build and implement a cyber threat hunting strategy
-
Understand adversary tactics and behaviors
-
Navigate Windows and Linux command-line environments
-
Use Cyber Threat Intelligence (CTI) to inform decisions
-
Analyze logs and identify anomalies using SIEM tools
-
Apply critical thinking in real-world investigative scenarios
-
Collaborate on a capstone hunt team project
-
Deliver findings through a professional written and oral report
Hands-On Exercises and Projects 🧪
Throughout the course, you will:
-
Practice command-line navigation and scripting on both Windows and Linux
-
Examine attacker techniques using threat emulation tools and intelligence sources
-
Analyze logs from simulated attacks in SIEM platforms
-
Conduct mini-hunts on sample data sets
-
Plan and lead a complete hunt operation with your team
Capstone Project Includes:
-
Threat hypothesis development
-
Evidence collection and validation
-
Written report documenting findings
-
Final team presentation simulating a security briefing
Included Learning Materials 🧰
-
Instructor-led videos with lesson slides
-
Interactive labs and exercises
-
Graded quizzes to reinforce key concepts
-
Downloadable hunt templates and tools
-
Collaborative workspaces for team projects
Optional Add-ons (if applicable in your platform) 📥
-
Badge or certificate of completion
-
Credit toward cybersecurity readiness credentials
-
Role-based micro-certification path (e.g., SOC Analyst Tier 1, Threat Hunter)