From £1,450+ VAT
Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0113 220 7150.
Overview
OffSec’s Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by enterprises to track and mitigate adversaries. Key areas include understanding the threat actor landscape, with a focus on ransomware and Advanced Persistent Threats (APTs), and utilising both network and endpoint Indicators of Compromise (IoCs) for proactive threat detection.
Upon successfully completing the rigorous hands-on exam, participants earn the OSTH – OffSec’s threat hunting certification. This credential demonstrates proficiency in foundational threat hunting practices, positioning certified professionals as valuable assets for roles in threat hunting, SOC analysis, and incident response teams.
You will have 90 days access to your digital product, including videos, labs and exam voucher.
Hunt for threats, defend with precision
Develop the practical skills essential for a successful role in threat hunting with TH-200. Master the ability to identify malicious activity, analyse attack patterns, and detect sophisticated threats in complex environments. Learn to cut through the noise and act decisively to protect critical systems.
Prerequisites
While there are no formal prerequisites, it’s strongly recommended that you have:
- A solid foundation in TCP/IP networking
- Familiarity with Linux and Windows operating systems
- Basic understanding of cybersecurity concepts
We recommend the OffSec SEC-100 (CyberCore) for those new to cyber security.
The TH-200 course is designed for individuals looking to build a strong foundation in threat hunting, including SOC analysts, IT security specialists, and those aiming to transition into specialised cybersecurity roles. It provides comprehensive training in threat hunting methodologies and practical skills.
Learning Outcomes
- Threat hunting concepts and practices
- Network and endpoint security
- Incident response and threat analysis
- Practical skills for roles in SOC analysis, threat hunting, and IT security
Outline
Topics covered in the Threat Hunting Course (TH-200)
- Threat Hunting Concepts and Practices
This module provides an overview of the basic objectives, concepts and practices of cyber threat hunting. It covers how enterprises implement threat hunting and the different stages and types of threat hunts.
- Threat Actor Landscape Overview
This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.
- Communication and Reporting for Threat Hunters
This module introduces the way in which threat hunters receive and use threat intelligence and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.
- Hunting with Network Data
This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in networks are covered, followed by hands-on exercises to develop threat detection skills.
- Hunting on Endpoints
This module provides an introduction to cyber threat hunting utilizing Endpoint IoCs. It covers intelligence-based and hypothesis-based threat hunting as well as considerations that improve the effectiveness of a hunt.
- Threat Hunting without IoCs
This module teaches threat hunting techniques that don’t rely on known IoCs. It covers custom threat hunting, focusing on behavioural analysis and data correlation to detect advanced threats. Tools like CrowdStrike Falcon are used to apply these methods in practical scenarios.
Exam (included in your course)
The OffSec Threat Hunter (OSTH) exam is a proctored, 8-hour hands-on assessment of your foundational threat hunting knowledge and practical skills. You’ll demonstrate your ability to identify, investigate, and respond to security threats in a simulated environment, focusing on real-world scenarios.
The OSTH certification expires three years after being awarded. Learners can maintain their OSTH designation by taking the recertification exam or completing the OffSec CPE program.
What's included
- Exam included
- Online exam voucher
Why choose QA
- Award-winning training, top NPS scores
- Nearly 300,000 learners in 2020
- Our training experts are industry leaders
- Read more about QA
QA is proud to be the UK official partner with Offensive Security.
Click here to view all our OffSec courses.
Click here to view the Learn Online subscriptions.
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.