TH-200: Foundational Threat Hunting

TH-200: Foundational Threat Hunting

OffSec’s Foundational Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by enterprises to track and mitigate adversaries. Key areas include understanding the threat actor landscape, with a focus on ransomware and Advanced Persistent Threats (APTs), and utilizing both network and endpoint Indicators of Compromise (IoCs) for proactive threat detection.

Upon successfully completing the rigorous hands-on exam, participants earn the OSTH – OffSec’s threat hunting certification. This credential demonstrates proficiency in foundational threat hunting practices, positioning certified professionals as valuable assets for roles in threat hunting, SOC analysis, and incident response teams.

Starting with certifications new to the market in 2024, OffSec certifications will expire after 3 years.

OSTH Certification Badge

Starting at $1,749

Hunt for threats, defend with precision

Develop the practical skills essential for a successful role in threat hunting with TH-200. Master the ability to identify malicious activity, analyze attack patterns, and detect sophisticated threats in complex environments. Learn to cut through the noise and act decisively to protect critical systems.

Foundational Threat Hunting Syllabus

  • Threat Hunting Concepts and Practices

    This module provides an overview of the basic objectives, concepts and practices of cyber threat hunting. It covers how enterprises implement threat hunting and the different stages and types of threat hunts.

  • Threat Actor Landscape Overview

    This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.

  • Communication and Reporting for Threat Hunters

    This module introduces the way in which threat hunters receive and use threat intelligence, and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.

  • Hunting with Network Data

    This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in networks are covered, followed by hands-on exercises to develop threat detection skills.

  • Hunting on Endpoints

    This module provides an introduction to cyber threat hunting utilizing Endpoint IoCs. It covers intelligence-based and hypothesis-based threat hunting as well as considerations that improve the effectiveness of a hunt.

  • Threat Hunting without IoCs

    This module teaches threat hunting techniques that don’t rely on known IoCs. It covers custom threat hunting, focusing on behavioral analysis and data correlation to detect advanced threats. Tools like CrowdStrike Falcon are used to apply these methods in practical scenarios.

*Course duration with associated exam: 41 hours

Start learning with OffSec

Most
popular

Course + Cert
Exam Bundle

$1,749/once

The bundle includes 90 days of access to a single course, the associated labs and a single exam attempt.

Buy now
Best
value

Learn
One

$2,749/year*

One year of lab access alongside a single course plus two exam attempts.

Buy now
All
access

Learn
Unlimited

$6,099/year*

Unlimited OffSec Learning Library access plus unlimited exam attempts for one year.

Contact us
Large
teams

Learn
Enterprise

Get a quote

Flexible terms and volume discounts available.

Book a meeting
*Subscription auto-renews unless canceled.

TH-200 FAQ