Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam's company needs to expand their threat-hunting capabilities. Sam has been selected to participate in a new program to build threat-hunting skills.

From Incident Response to Cyber Threat Hunting

The CISO at Sam’s company recently formalized a cyber workforce development program, which highlighted a gap in their threat-hunting capability. Sam is an incident responder with 2 years of experience at the company and scored highly in an assessment designed to identify suitable resources for a new threat-hunting team. Sam, along with 5 teammates, will be participating in a development program over the next 18 months to enable this critical new function.

Suggested Learning Track

The following is a sample learning program for professionals looking to transition into a Cyber Threat Hunter role.

Live System Analysis

During this training, students learn how to identify abnormal activity and investigate a running Windows or Linux system that may have been compromised.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Behavioral Malware Analysis

Using system monitoring tools and analytic software, students will analyze real-world malware samples in a training environment, building secure labs, classifying malware, analyzing behavior, and documenting findings.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Malicious Network Traffic Analysis

This course teaches students how to identify and analyze the most common types of reconnaissance, attack, lateral movement, exfiltration, and command-and-control traffic found in today’s networks.

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 College Credit

Python for Network Defenders

This course was created for novice programmers or those new to Python and designed for a very hands-on instructional experience. This course will equip you with skills you can immediately leverage to build powerful Python scripts.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Hacker Methodologies

Students learn to identify, scan, and enumerate target systems, correlate services to vulnerabilities and exploits, gain access to target systems, elevate privileges, propagate through the network, and cover their tracks.

Learn More
01 5-Day Course
02 10+ Lab Exercises
03 CPE/CEU Credit

Cyber Threat Detection and Mitigation

Taught by experts in network defense, this course equips attendees with the skills to build and maintain IDS/IPS and utilize advanced signature-writing techniques to defend large-scale network infrastructures.

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 College Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.
Have a question?

Contact Us

Focal Point is excited to help you advance your cybersecurity team. If you'd like to speak to a Focal Point expert or inquire about our services, please fill out the following form.

Featured Learning Tracks

See where cyber workforce development can take your team.
SOC Analyst I
Learning Track

Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Learn More
Malware Reverse Engineer
Learning Track

Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years and is transitioning to a Reverse Engineering role.
Learn More
Cyber Skills Development 4
Learning Track

Malware Triage Analyst

Alex is an incident responder. After a year in this role, she is looking to further specialize her skillset. Her manager is giving Alex the opportunity to move into a malware triage role.
Learn More