Skip to main content
Bobby Thomas - Hunt Methodologies - $2325 ($2175 early registration)
Bobby Thomas - Hunt Methodologies - $2325 ($2175 early registration)

Bobby Thomas - Hunt Methodologies - $2325 ($2175 early registration)


Trainer bio:
Bobby Thomas has over 20 years of experience in cyber operations, network analysis, and exploitation. He possesses a comprehensive background in cyber network operations from planning to execution, intelligence operations, management, technical training course development and revision. Bobby currently works on Deloitte’s Advanced Cyber Training Team. He has his master’s degree in cyber security and multiple industry leading certifications to include: CISSP, GCFA, GCFE, CEH, and Security+.

Trainer social media links:
@DeloitteUS on Twitter
#deloitte on Twitter

 Full description of the training:
Hunt Methodologies provides a baseline level of knowledge designed to train cybersecurity professionals to actively defend critical computer systems. The course exposes participants to a “Think like the Adversary” mindset to actively detect sophisticated and tailored adversary attacks. This course is designed to prepare cybersecurity professionals to Hunt within their network for evidence of adversary presence not previously detected by automated enterprise security devices and software.
Rather than simply reacting to network attacks, participants of this cyber threat hunting training learn methods to interrogate systems and analyze data proactively and remotely. This empowers participants to proactively discover systems targeted by an adversary. Participants learn how to discover malicious code, and evidence of adversary presence and lateral movement within a network. Throughout the program, instructors share their experience in cybersecurity, operations, and tool development. This provides participants an appreciation of the challenges they may face in countering the cyber adversary.
*Students will receive 6 months of access to our virtual lab environment.
Short description of what the student will know how to do, after completing the class:
This course provides a foundational level of knowledge for cybersecurity professionals tasked with actively defending critical computer systems. It encourages participants to “Think like the Adversary” to proactively identify sophisticated and tailored attacks within a network. The course and is designed to help prepare cybersecurity professionals to actively hunt systems for evidence of adversary presence that may not have been detected by automated enterprise security devices and software.
*Students will receive 6 months of access to our virtual lab environment.
Outline of the class:
Module 1: Introduction to Hunt tools
Module 2: Introduction to Hunt Methodologies
Module 3: Review indicators of compromise
Module 4: Environment collection
Module 5: Discover indicators of compromise
Module 6: Targeted collection and analysis
Module 7: Active adversary engagement
Module 8: Capstone and final report
Technical difficulty of the class (Beginner, Intermediate, Advanced):

Suggested prerequisites for the class:
There are no prerequisites for this class.
Items students will need to provide:
Participants will need to bring their own device with a modern web browser / keyboard.  

DATE: August 12th-13th, 2024

TIME: 8am to 5pm PDT

VENUESahara Las Vegas

TRAINER: Bobby Thomas

- 16 hours of training with a certificate of completion.
- 2 coffee breaks are provided per day
- Note: Food is not included

Registration terms and conditions:

Trainings are refundable before July 1st, the processing fee is $250.

Trainings are non-refundable after July 10th, 2024.

Training tickets may be transferred. Please email us for specifics.

Failure to attend the Training without prior written notification, will be considered a No-Show. No refund will be given.

By purchasing this ticket you agree to abide by the DCT Code of Conduct and the registration terms and conditions listed above.