Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam's company needs to expand their threat-hunting capabilities. Sam has been selected to participate in a new program to build threat-hunting skills.

From Incident Response to Cyber Threat Hunting

The CISO at Sam’s company recently formalized a cyber workforce development program, which highlighted a gap in their threat-hunting capability. Sam is an incident responder with 2 years of experience at the company and scored highly in an assessment designed to identify suitable resources for a new threat-hunting team. Sam, along with 5 teammates, will be participating in a development program over the next 18 months to enable this critical new function.

Suggested Learning Track

The following is a sample learning program for professionals looking to transition into a Cyber Threat Hunter role.

Cyber Threat Analyst I Track

This track equips professionals with the skills to identify and investigate incidents from an operating system, network forensics and malware triage perspective. They are able to identify anomalous activity, determine the scope of that activity, and report or mitigate as appropriate.

Learn More
01 Network Forensics
02 Malware Analysis
03 Endpoint Live Forensics

Network Forensics and Investigation II

This course teaches students how to identify and analyze the most common types of reconnaissance, attack, lateral movement, exfiltration, and command-and-control traffic found in today’s networks.

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 College Credit

Automated Network Defense

Taught by experts in network defense, this course equips attendees with the skills to build and maintain IDS/IPS and utilize advanced signature-writing techniques to defend large-scale network infrastructures.

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 College Credit

Threat Hunting with Python

This course was created for novice programmers or those new to Python and designed for a very hands-on instructional experience. This course will equip you with skills you can immediately leverage to build powerful Python scripts.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Hacker Methodologies

Students learn to identify, scan, and enumerate target systems, correlate services to vulnerabilities and exploits, gain access to target systems, elevate privileges, propagate through the network, and cover their tracks.

Learn More
01 5-Day Course
02 10+ Lab Exercises
03 CPE/CEU Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.

Featured Learning Tracks

See where cyber workforce development can take your team.
SOC Analyst I
Learning Track

Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Learn More
Malware Reverse Engineer
Learning Track

Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years and is transitioning to a Reverse Engineering role.
Learn More
Cyber Skills Development 4
Learning Track

Malware Triage Analyst

Alex is an incident responder. After a year in this role, she is looking to further specialize her skillset. Her manager is giving Alex the opportunity to move into a malware triage role.
Learn More