In-Depth Investigation & Threat Hunting
Master advanced techniques for digital investigation, threat hunting, and incident response to detect and respond to sophisticated APT and ransomware attacks early.
Offer expires July 15th, 2025
Course Overview
Master Advanced Threat Detection
With the rise of APT attacks and targeted ransomware attacks, there's a huge need for in-depth investigation & threat hunting skills to detect these attacks early on before the cost of the breach gets tripled every day.
This training focuses on teaching you how to perform in-depth investigations through collecting key artifacts, live forensics, memory forensics, and automating analysis across the enterprise. You'll also learn threat hunting based on the MITRE ATT&CK framework and threat intelligence.
This program is designed to equip you with:
Purple Team Exercises
Simulate APT attacks, fileless malware, and ransomware to test and improve detection capabilities
Digital Investigation
Master live forensics, memory analysis, and automated artifact collection across the enterprise
Threat Intelligence
Build a threat hunting process powered by MITRE ATT&CK and current threat intelligence
Detection Engineering
Develop and implement custom detection rules and response playbooks
Offer expires August 1st, 2025
Program Differentiators
What Makes This Training Unique
A comprehensive approach to threat detection taught through real-world scenarios
Practical Investigation Process
Learn the complete digital investigation process from initial triage to in-depth analysis and reporting.
Cloud-Based Lab Environment
Practice in a realistic environment with modern security tools and actual attack scenarios.
Current Threat Focus
Training content aligned with current threats and attack techniques seen in the wild.
Offer expires August 1st, 2025
Course Content
Comprehensive Training Syllabus
Offer expires August 1st, 2025
Training Package
What You'll Receive
Comprehensive resources to master threat detection
4-Day Live Training Over Zoom
28 hours of intensive hands-on training with 1-Year access to all session recordings for self-paced review and reinforcement.
Purple Team Lab Environment
Complete cloud lab environment with HELK, Atomic Red Team, and Caldera setup for hands-on practice during and after training.
Investigation Resources
Sample files including log files, memory dumps, and KAPE artifacts for analysis and hunting practice.
Tool Collection
Pre-configured analysis environment with essential forensics and threat hunting tools ready for immediate use.
And So Much More
- Detailed lab guides and exercise materials
- Cloud lab deployment guides
- Detection rule templates
- Post-training community access
Key Benefits
Top 3 Takeaways from This Training
Purple Team Exercise Mastery
Learn to perform purple team exercises that simulate APT attacks, fileless malware, and targeted ransomware attacks from initial access through lateral movement.
Investigation Process Expertise
Master in-depth digital investigation through live forensics, triaging, memory forensics, and automated artifact analysis across the enterprise.
Threat Hunting Framework
Build and implement a comprehensive threat hunting process powered by the MITRE ATT&CK framework and current threat intelligence.
Ideal Participants
Who Should Take This Course?
SOC Analysts
Security operations analysts looking to enhance their threat detection and investigation capabilities.
Incident Handlers
Incident response team members who want to improve their investigation and threat hunting skills.
Threat Hunters
Security professionals focused on proactive threat detection and investigation.
Prerequisites
To get the most out of this course, participants should have:
Meet Your Instructor
Learn from a Recognized Industry Expert

Amr Thabet
Founder & CEO, Malware Analyst, Author
Amr Thabet is a distinguished security consultant and malware researcher with over 17 years of experience in cybersecurity. His career spans roles at Fortune 500 companies, including Symantec and Tenable, where he has established himself as a leading authority in malware analysis and advanced threat detection.
He is the author of "Mastering Malware Analysis," one of the highest-rated books in the field, published by Packt Publishing. This comprehensive guide has become a go-to resource for security professionals worldwide looking to develop their malware analysis skills.
Amr has played a pivotal role in uncovering some of the most significant malware threats in modern history, including Stuxnet, Regin, and Contopee. His analysis of these sophisticated cyber weapons has provided crucial insights into how malware can be weaponized against critical infrastructure.
A respected voice in the global security community, Amr regularly speaks and conducts training at premier security conferences worldwide, including BlackHat, DEFCON, Hack In Paris, and VB Conference. His research has been recognized by major technical publications and media outlets.
Ready to Master Threat Detection?
Join this intensive 4-day training to develop the advanced skills needed to detect and respond to sophisticated cyber threats. Limited spots available.
Training Fee
Super Early-Bird pricing (Expires August 1st)
Laptop requirements: Minimum 8GB RAM and 50GB free disk space. Windows OS or VM with Windows OS installed. Setup instructions will be provided prior to training.