Cyber Security Category

OffSec TH-200 - Foundational Threat Hunting (OSTH) - Self-paced

  • Length 90 days access
  • Price  $3080 inc GST
  • Inclusions OSTH exam
Course overview
Book now

Why study this course

OffSec’s Foundational Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by enterprises to track and mitigate adversaries. Key areas include understanding the threat actor landscape, with a focus on ransomware and Advanced Persistent Threats (APTs), and utilising both network and endpoint Indicators of Compromise (IoCs) for proactive threat detection.

Upon successfully completing the rigorous hands-on exam, participants earn the OSTH - OffSec’s threat hunting certification. This credential demonstrates proficiency in foundational threat hunting practices, positioning certified professionals as valuable assets for roles in threat hunting, SOC analysis, and incident response teams.

Throughout the online training course, you’ll have access to:

  • A virtual lab environment for hands-on practice, for 90 days

  • The TH-200 curriculum - extensive course information and materials, including videos and exercises

  • A vibrant online community of students and OffSec professionals

  • One exam attempt

Request Course Information


What you’ll learn

Upon completing the TH-200 course and successfully passing the OSTH exam, you’ll gain a strong foundation in:

  • Threat hunting concepts and practices

  • Network and endpoint security

  • Incident response and threat analysis

  • Practical skills for roles in SOC analysis, threat hunting, and IT security


OffSec Partner Logo - Gold Channel

OffSec at Lumify Work

Security professionals from top organisations rely on OffSec to train and certify their personnel. Lumify Work is an Official Training Partner for OffSec.


Who is the course for?

The TH-200 course is designed for individuals looking to build a strong foundation in threat hunting, including SOC analysts, IT security specialists, and those aiming to transition into specialised cybersecurity roles. It provides comprehensive training in threat hunting methodologies and practical skills.


Course subjects

Threat Hunting Concepts and Practices

  • An overview of the basic objectives, concepts, and practices of cyber threat hunting.

  • How enterprises implement threat hunting and the different stages and types of threat hunts

Threat Actor Landscape Overview

  • An overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs)

  • In-depth discussions of well-known threat actors

Communication and Reporting for Threat Hunters

  • Introduces the way in which threat hunters receive and use threat intelligence, and create threat reports

  • The concept of the Traffic Light Protocol (but not IoCs)

Hunting with Network Data

  • Explores using Network Indicators of Compromise (IoCs) for proactive threat hunting

  • Highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities

  • Practical methods to identify signs of compromise in networks

  • Hands-on exercises to develop threat detection skills

Hunting on Endpoints

  • An introduction to cyber threat hunting utilising Endpoint IoCs

  • Intelligence-based and hypothesis-based threat hunting

  • Considerations that improve the effectiveness of a hunt

Threat Hunting without IoCs

  • Threat hunting techniques that don’t rely on known IoCs

  • Custom threat hunting, focusing on behavioural analysis and data correlation to detect advanced threats

  • Tools like CrowdStrike Falcon are used to apply these methods in practical scenarios

View the full syllabus here.


Prerequisites

While there are no formal prerequisites, it’s strongly recommended that you have:

  • A solid foundation in TCP/IP networking

  • Familiarity with Linux and Windows operating systems

  • Basic understanding of cybersecurity concepts

All of the above can be found in the Offsec Security Operations Essentials Learning Path, available in Learn Enterprise, Learn Unlimited, Learn One, or Learn Fundamentals.


THIRD PARTY REGISTRATION

Lumify Work offers certification and training through our partnership with OffSec. This arrangement requires Lumify Work to provide your details to OffSec for course and/or exam registration purposes.



Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Select and book a course

Options

Can't find a date you like?

Contact sales