Cybersecurity Threat Hunting for SOC Analysts
By Skilific .
Master proactive threat hunting with hands-on labs, real-world tools, and adversary simulations. Build detection skills SOC analysts need to uncover hidden threats before they strike.
In today’s rapidly evolving cyber landscape, traditional defense measures are no longer enough. Organizations need proactive defenders who can uncover hidden threats before they cause damage. This course is designed to transform you into a skilled SOC analyst with hands-on threat hunting expertise, ready to detect, investigate, and neutralize advanced adversaries.
Through a structured, lab-driven curriculum, you’ll gain real-world, practical experience with industry-standard tools and frameworks. From analyzing malicious PCAPs to detecting beaconing activity and running adversary emulation, this course equips you with the end-to-end methodology of modern threat hunting.
tshark
, tcpdump
, ngrep
, RITA, and advanced network forensic utilities.Unlike courses that only teach theory, this training is lab-based and simulation-driven, giving you battle-tested experience with the same tools, environments, and scenarios SOC teams face every day. By the end, you’ll not only understand how to hunt threats, but also why adversaries behave the way they do—a crucial skill for becoming a standout SOC analyst.
Take the step from passive monitoring to active defense—enroll now and become a Threat Hunter that adversaries fear.
1. Download VMWare Workstation Pro
2. Install VMWare Workstation Pro
3. Download Kali Linux VM
4. Install Kali Linux VM
5. Configure Kali Linux VM pimpmykali.sh
6. Configure Kali Linux VM TMUX
7. Configure Kali Linux VM Odds and Ends
1. Active Countermeasures Malware of the Day
2. Malware Traffic Analysis
1. Wireshark
2. tshark
3. tcpdump
4. ngrep
5. capinfos
6. RITA Installing MongoDB
7. RITA Building RITA from Source
8. zeek
9. Using zeek _ Rita to find Evil!
1. Understanding the New Adversary
2. The Broken Threat Hunting Mindset
3. The Modern Threat Hunting Mindset
4. Beaconing Basics
5. Beaconing DNS
6. Beaconing CDN
7. Beaconing Detection Timing
8. Beaconing Detection Session Size Analysis
1. Finding Beacons Long and Cumulative Connections
2. Finding Beacons Business Need Analysis (Part 1)
3. Finding Beacons Business Need Analysis (Part 2)
4. Finding Beacons Business Need Analysis (Part 3)
5. Finding Beacons Business Need Analysis (Part 4)
6. Finding Beacons Unexpected app on Standard Port
7. Finding Beacons Unexpected Protocol Behavior
8. Finding Beacons Destination IP Reputation Check
9. Finding Beacons Internal Endpoint Investigation
1. Suricata Capabilities _ Installation!
2. Suricata vs RITA Zeus Malware
3. Suricata vs RITA Powershell Empire
The best way to judge us? Hear it straight from our students!