Credential Verification
Issue date: April 8, 2025
ID: 123a52dd-0515-4544-88b0-095ea7fe7549
Description
Program completers of the "Threat Hunting and Intelligence" are proficient in proactive threat identification and mitigation. They are knowledgeable in the threat-hunting process and intelligence gathering. Trained in several conceptual models and MITRE ATT&CK framework, they excel in formulating hunting hypotheses, inspecting organizational systems, analyzing network traffic, and identifying anomalies that may indicate threats. Their skills extend to implementing threat intelligence, modern tools, techniques, and behavioral analysis into threat detection. Additionally, they are adept in advanced practices required to detect and respond to Advanced Persistent Threats (APTs) and deal with unique challenges in cloud environments.
Earning Criteria
Other
Learners must demonstrate strong skills in threat hunting and intelligence analysis, applying concepts to real-world scenarios. They should be proficient in gathering and correlating cyber threat intelligence and developing hunting hypotheses using MITRE ATT&CK. Participants must excel in network traffic analysis, anomaly detection, behavioral analysis, and endpoint examination, including cloud environments, while implementing threat-hunting practices in security operations.