CyberBlue Threat Hunting

From Alert Responder to Threat Hunter

Go beyond alerts. Learn to hunt for threats that detections miss — using fresh attack scenarios, constrained-data exercises, and open-ended investigations across SIEM, network, and endpoint tools.

60-75 hours8 Modules22+ Hands-on Labs

Course Modules

Module 1: Foundations — How Hunters Think

Learn the mental models, anomaly patterns, and data manipulation skills that separate hunters from alert responders.

Free
4 Lessons4 Labs
Wazuh

Module 2: SIEM Hunting Deep Dive

Hunt within constrained data — authentication only, Sysmon only, network logs only. Discover what each source reveals and what it hides.

Free
5 Lessons5 Labs
Wazuh

Module 3: Network and Endpoint Hunting

Expand beyond the SIEM. Hunt with Suricata network signatures and Velociraptor endpoint forensics.

Free
4 Lessons4 Labs
Suricata + EveBox, Velociraptor, Wazuh

Module 3: Adversary Technique Hunting

Hunt for specific ATT&CK technique categories: credential access, persistence, lateral movement, privilege escalation, and defense evasion.

Free
5 Lessons3 Labs
Wazuh

Module 4: Operationalizing the Hunt

Turn hunting into a repeatable, measurable program. Document, automate, and prove value to leadership.

Free
4 Lessons3 Labs
Wazuh, Sigma

Module 4: Network and Endpoint Hunting

Expand beyond the SIEM. Hunt with Suricata network signatures and Velociraptor endpoint forensics.

Free
4 Lessons4 Labs
Suricata + EveBox, Velociraptor, Wazuh

Module 5: File and Memory Hunting

Hunt at the file and memory level. Build YARA rules for hunting, stack file metadata for anomalies, decode encoded payloads, and analyze memory artifacts.

Free
4 Lessons3 Labs
Wazuh, Velociraptor

Module 6: Operationalizing the Hunt

Turn hunting into a repeatable, measurable program. Document, automate, and prove value to leadership.

Free
5 Lessons3 Labs
Wazuh, Sigma