
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreIn this course, we’ll go over the TCP/IP stack and learn how to recognize normal network traffic. We will then use that foundation and attempt to detect suspicious network traffic patterns. Additionally, we will also look at how to detect web shells and C2 channels hiding in our environment using various tools. During web shell hunting, we will also cover how you can combine threat intelligence with statistical analysis to hunt for threats on the wire. This course is part of the Threat Hunting Professional Learning path which prepares you for the eCTHPv2 exam and certification.
Instructor for this course
Slavi Parpulev
eCTHP, eCPTX, OSCE, OSCP, GCFA, AZ-500, Microsoft INF260x
Introduction to Network Hunting - Study Guide
Suspicious Traffic Hunting - Study Guide
Network Miner
RSA NetWitness Investigator
Wireshark
Packet Hunting
Hunting Insider Threats Part 1
Hunting Insider Threats Part 2
Network Hunting & Forensics
Hunting Web Shells - Study Guide
Log Parser Studio
Hunting Web Shells Part 1
Hunting Web Shells Part 2
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?