DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Career Certification

Certified Threat Hunting Professional (CTHP)

eLearn Security

Reading Time: 6 mins read
in Career, Certification, Malware

Issuer eLearn Security
Level Advanced
Career Opportunities Threat Hunters, DFIR Professionals, Security Blue Teams, Detection Engineers, SOC Analysts, Malware Analysts
Skills Network packet/traffic analysis, Data enrichment with Threat Intelligence, Data correlation, IOC, Memory analysis/forensics, Windows/Linux event analysis, Log analysis, “Cyber Kill Chain”
Cost Paid
Validity 3 years
Renewal Retake exam
Themes Threat Intelligence, Network Security, Endpoint security, Malware Analysis, IOCs

Overview

eLearnSecurity’s Certified Threat Hunting Professional is an expert-level certification that proves your threat hunting and threat identification capabilities. Students are tested through real-world scenarios modeled after cutting-edge malware that simulates corporate network vulnerabilities.

 

Areas Covered

  • Network packet/traffic analysis
  • Data enrichment with Threat Intelligence
  • Data correlation
  • In-depth knowledge of tools such as Wireshark, Redline & IOC editor
  • IOC-based threat hunting
  • Memory analysis/forensics
  • Windows/Linux event analysis
  • Log analysis
  • Detection of any stage of the “Cyber Kill Chain” (Information Gathering, Exploitation, Post-exploitation)

Who is CTHP for?

  • Threat Hunters
  • DFIR Professionals
  • Security Blue Teams
  • Detection Engineers
  • SOC Analysts
  • Malware Analysts

Exam Details

  • Type of Exam: Practical real-life type exam
  • Length of Test: 4 days, the first two days are for the practical exam and the next two days are for creating the report

Official Study Materials

  • INE – Threat Hunting Professional Learning Path

Additional Study Materials

  • CyberDefenders – Blue Team Training Course

  • Blue team Labs Online – Testing Platform  

ENROLL TODAY

Disclaimer: Reference in this site to any specific commercial product, process, service, certification, or the use of any trade, firm or corporation name is for the information and convenience of the public, and does not constitute endorsement, recommendation, or favoring by CyberMaterial.

 

 

Tags: CertificationCertificationsCyber securityEducationEndpoint SecurityIOCIOCsLearningMalware AnalysisNetwork SecurityThreat HuntingThreat Hunting CertificationThreat Hunting DocumentsThreat Intelligence
ADVERTISEMENT

Related Posts

Certified Security Leadership Officer (CSLO)

Certified Security Leadership Officer (CSLO)

August 18, 2023
Azure Administrator Associate

Azure Administrator Associate

August 18, 2023
AWS Certified Solutions Architect

AWS Certified Solutions Architect

August 18, 2023
Cisco Certified Network Associate (CCNA)

Cisco Certified Network Associate (CCNA)

August 18, 2023

More Articles

News

IBM Report Reveals Surging Cloud Intrusions

September 15, 2023
Alerts

ChromeLoader Campaign: Shampoo Threat

June 15, 2023
Alerts

WordPress plugin with critical vulnerability: Contact Form 7 Update 5.3.2

December 17, 2020
Alerts

CISA Updates Catalog, Urges Remediation

June 8, 2023

Can’t get phished…

October 9, 2020

NCIS: A Bowl of Cherries (Season 14 | Episode 20)

March 23, 2021
Book

Preventing Cyber-Attacks: Solutions for Small Businesses

November 29, 2021
Document

FBI: Safety and Security for the Business Professional Traveling Abroad

April 7, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.