CTH – Certified Threat Hunter
August 3, 2022 2022-08-03 10:06CTH – Certified Threat Hunter
CTH - Certified Threat Hunter
#job-oriented Threat hunter program
This job-oriented soc analyst program was specially designed from industrial soc experts team to get jobs as a soc analyst L1 & soc analyst L2. focusing on major siem tools like Splunk enterprise, IBM Qradar, Alien vault, Cortex XSOAR and cortex XDR. and architectures like inhouse, hybrid and MSSP also. This 4 month program includes certification and dedicated job support as well.Â
65+ already registered
60+ already successfully placed in MNC’s
This SCSA job-oriented program especially designed with enterprise siem solutions and soc architectures (inhouse, hybrid, and MSSP). we are explain enterprise siem tools like Splunk Enterprise, Qradar, Alien vault, XSOAR and XDR. SiemHunters in partnership with most reputed companies and we have our dedicated job portal to connect 100+ organizations. it helps to learn enterprised level Siem tools and SOC technologies used to monitor, analyze, and investigate the security incidents in organizations. This program mostly focuses on defend the security breaches and monitor security incidents in 24/7. Our certified instructors delivery enterprise level real-time incidents using siem tools and aws labs.Â
Enterprised Siem tools: Splunk Enterprise, Qradar, Alien Vault, XSOARÂ
Become an Experience SOC Analyst..!
Start to Success
#enterprise scenario based SIEM training
SiemHunters is a unit of Cyberloop & Pentesterzone. We are provide enterprise based training and lab scenarios, We have 10+ industrial certified instructor team to delivery Ec Council courses and certifications.
Certified SOC Analyst SCSA v1 will teach you the latest SIEM Tools and architecture-based Techniques and methods followed by the enterprises. we are delivering courses as per the organization scenarios and their standards and create our own enterprise lab scenarios also.Â
Key Features of SCSA v1
120+ Hours of Instructor Led Training
Flexible timings
40+ Enterprise Labs
Exam Voucher Included
Dedicated Job portal
Self-Learning Access
Learning Path
lesson1 – Information Security Overview
lesson2 – Information Security Threats and Attack Vectors
lesson3 – Hacking Concepts
lesson4 – Ethical Hacking Concepts
lesson5 – Information Security Controls — part 1
lesson5 – Information Security Controls — part 2
lesson6 – Penetration Testing Concepts
lesson7 – Information Security Laws and Standards
Learn: security threats, attack vectors, security laws, pentesting concepts,security laws and standards
lesson1 – Footprinting Concepts
lesson2 – Footprinting through Search Engines
lesson3 – Footprinting through Web Services
lesson4 – Footprinting through Social Networking Sites
lesson5 – Website Footprinting
lesson6 – Email Footprinting
lesson7 – Competitive Intelligence
lesson8 – Whois Footprinting
lesson9 – DNS Footprinting
lesson10 – Network Footprinting
lesson11 – Footprinting through Social Engineering
lesson12 – Footprinting Tools
lesson13 – Footprinting Countermeasures
lesson14 – Footprinting Penetration Testing
Learn: footprinting concepts,search engines,web services,email footprinting,whois footprinting,DNS footptinting,footprinting tools,countermeasures,footprinting pentesting
lesson1 – Network Scanning Concepts
lesson2 – Scanning Tools
lesson3 – Scanning Techniques part 1
lesson3 – Scanning Techniques part 2
lesson4 – Scanning Beyond IDS and Firewall part 1
lesson4 – Scanning Beyond IDS and Firewall part 2
lesson5 – Banner Grabbing
lesson6 – Draw Network Diagrams
lesson7 – Scanning Pen Testing
Learn: network scanning concepts,scanning tools,techniques,scanning beyond IDS and firewall,banner grabbing,draw network diagrams,scanning pentesting
lesson1 – Enumeration Concepts
lesson2 – NetBIOS Enumeration
lesson3 – SNMP Enumeration
lesson4 – LDAP Enumeration
lesson5 – NTP Enumeration
lesson6 – SMTP and DNS Enumeration
lesson7 – Other Enumeration Techniques
lesson8 – Enumeration Countermeasures
lesson9 – Enumeration Pen Testing
Learn: enumeration concepts,netBIOS enumeration,SNMP enumeration,SMPT and DNS enumeration,enumeration countermeasures,enumeration pentesting
lesson1 – Vulnerability Assessment Concepts
lesson2 – Vulnerability Assessment Solutions
lesson3 – Vulnerability Scoring Systems
lesson4 – Vulnerability Assessment Tools
lesson5 – Vulnerability Assessment Reports
Learn: vulnerability assessment concepts.solutions,scoring systems,assessment tools,assessment reports
lesson1 – System Hacking Concepts
lesson2 – Cracking Passwords part 1
lesson2 – Cracking Passwords part 2
lesson2 – Cracking Passwords part 3
lesson3 – Escalating Privileges
lesson4 – Executing Applications
lesson5 – Hiding Files part 1
lesson5 – Hiding Files part 2
lesson5 – Hiding Files part 3
lesson6 – Covering Tracks
lesson7 – Penetration Testing
Learn: system hacking concepts,cracking passwords,escalating privileges,executing applications,hiding files,covering tracks,penetration testing
lesson1 – Malware Concepts
lesson2 – Trojan Concepts part 1
lesson2 – Trojan Concepts part 2
lesson2 – Trojan Concepts part 3
lesson3 – Virus and Worm Concepts part 1
lesson3 – Virus and Worm Concepts part 2
lesson3 – Virus and Worm Concepts part 3
lesson4 – Malware Analysis part 1
lesson4 – Malware Analysis part 2
lesson4 – Malware Analysis part 3
lesson5 – Countermeasures
lesson6 – Anti-Malware Software
lesson7 – Malware Penetration Testing
Learn: malware concepts,trojan concepts,virus and worm concepts,malware analysis,countermeasures,anti-malware software,malware pentesting
lesson1 – Sniffing Concepts
lesson2 – Sniffing Techniques part 1
lesson2 – Sniffing Techniques part 2
lesson2 – Sniffing Techniques part 3
lesson3 – Sniffing tools
lesson4 – Countermeasures
lesson5 – Sniffing Detection Techniques
lesson6 – Sniffing Pen Testing
Learn: sniffing concepts,techniques,tools,countermeasures,sniffing detection techniques,sniffing pentesting
lesson1 – Social Engineering Concepts
lesson2 – Social Engineering Techniques
lesson3 – Insider Threats
lesson4 – Impersonation on Social Networking Sites
lesson5 – Identity Theft
lesson6 – Countermeasures
lesson7 – Social Engineering Pen Testing
Learn: social engineering concepts,techniques,insider threats,impersonation on social networking sites,identify theft,countermeasures,social engineering pentesting
lesson1 – DOS/DDoS Concepts
lesson2 – DOS/DDOS Attack Techniques
lesson3 – Botnets
lesson4 – DDoS Case Study
lesson5 – DoS/DDOS Attack Tools
lesson6 – Countermeasures
lesson7 – DoS/DDoS Protection Tools
lesson8 – DoS/DDoS Penetration Testing
Learn: DOS/DDOS concepts, attack techniques,botnets,DDos case study,attack tools,Dos/DDos protection tools, penetration testing
lesson1 – Session Hijacking Concepts
lesson2 – Application Level Session Hijacking
lesson3 – Network Level Session Hijacking
lesson4 – Session Hijacking Tools
lesson5 – Countermeasures
lesson6 – Penetration Testing
Learn: session hijacking concepts,application level hijacking,network level hijacking,session hijacking tools,countermeasures
lesson1 – IDS, Firewall and Honeypot Concepts part 1
lesson1 – IDS, Firewall and Honeypot Concepts part 2
lesson2 – IDS, Firewall and Honeypot Solutions
lesson3 – Evading IDS
lesson4 – Evading Firewalls
lesson5 – IDS/Firewall Evading Tools
lesson6 – Detecting Honeypots
lesson7 – IDS/Firewall Evasion Countermeasures
lesson8 – Penetration Testing
Learn: IDS,firewall and honeypot concepts and solutions,evading IDS,evading firewalls,IDS/firewall evading tools,detecting honeypots,IDS/firewall evasion countermeasures
lesson1 – Web Server Concepts
lesson2 – Web Server Attacks
lesson3 – Web Server Attack Methodology
lesson4 – Web Server Attack Tools
lesson5 – Countermeasures
lesson6 – Patch Management
lesson7 – Web Server Security Tools
lesson8 – Web Server Pen Testing
Learn: web server concepts,attacks,attack methodology,attack tools,patch management,web server security tools, web server pentesting
Lesson 1
Lesson 2
Lesson 3
Lesson 4
Lesson 5
Lesson 6
Learn:Â
lesson1 – SQL Injection Concepts
lesson2 – Types of SQL Injection
lesson3 – SQL Injection Methodology part 1
lesson3 – SQL Injection Methodology part 2
lesson4 – SQL Injection Tools
lesson5 – Evasion Techniques
lesson6 – Countermeasures
Learn: SQL injection concepts, types of sql injection and methodology,tools,evasion techniques,counterneasures
lesson1 – Wireless Concepts
lesson2 – Wireless Encryption
lesson3 – Wireless Threats
lesson4 – Wireless Hacking Methodology part 1
lesson4 – Wireless Hacking Methodology part 2
lesson5 – Wireless Hacking Tools
lesson6 – Wireless Hacking Tools
lesson7 – Countermeasures
lesson8 – Wireless Security Tools
lesson9 – Wireless Pen Testing
Learn: wireless concepts,encryption,threats,wireless hacking methodology,hacking tools,wireless security tools,countermeasures
lesson1 – Mobile Platform Attack Vectors
lesson2 – Hacking Android OS part 1
lesson2 – Hacking Android OS part 2
lesson3 – Hacking iOS
lesson4 – Mobile Spyware
lesson5 – Mobile Device Management
lesson6 – Mobile Security Guidelines and Tools
lesson7 – Mobile Pen Testing
Learn: mobile platform attack vectors,hacking android OS,hacking IOS,spyware,device management,security guidlines and tools,mobile pentesting
lesson1 – loT Concepts
lesson2 – lot Attacks
lesson3 – lot Hacking Methodology
lesson4 – lot Hacking Tools
lesson5 – Countermeasures
lesson6 – lot Pen Testing
Learn: IOT concepts,attacks,
lesson1 – Cloud Computing Concepts
lesson2 – Cloud Computing Threats
lesson3 – Cloud Computing Attacks
lesson4 – Cloud Security
lesson5 – Cloud Security Tools
lesson6 – Cloud Penetration Testing
Learn: cloud computing concepts,threats,attacks,cloud security,security tools, cloud pentesting
lesson1 – Cryptography Concepts
lesson2 – Encryption Algorithms
lesson3 – Cryptography Tools
lesson4 – Public Key Infrastructure (PKI)
lesson5 – Email Encryption
lesson6 – Disk Encryption
lesson7 – Cryptanalysis
lesson8 – Countermeasures
Learn: cryptography concepts,tools,encryption algorithms,PKI,email encryption,disk encryption,cryptanalysis,countermeasures
Tools Covered
Certified Ethical Hacker Details
Target Audience
CEH Certification does not require any prerequisite
Information Security Analyst
Fresher graduates
Auditors
Security Analyst
Exam Information
For EC-Council Certified Ethical Hacker (CEH) certification
Test Format: Multiple Choice
Number of Questions: 125
Test Duration: 4 Hours
Learning Options
Classroom training
₹43500/-
Certification & Training
- 120 Hours of Training - in person
- 24/7 Instructor support
- 100+ Tools and Enterprised lab scenarios
- Life time Self-Learning access (180+ videos include labs)
- Exam Voucher included & Support
- Job support with dedicated job portal
Self-Learning Access
₹30500/-
Certification & Self Learning
- 180+ videos access (Life time)
- 24/7 Instructor support
- 6+ months Enterprised lab access & aws access also.
- In exam support & Proctor support
- Exam Voucher included & Support
- Job support with dedicated job portal
Enterprise Training
--
Certification & Training
- 80 Hours of Training (8 hours/day)
- 24/7 Instructor support
- 100+ Tools and Enterprised lab scenarios
- Life time Self-Learning access (180+ videos include labs)
- Exam Voucher included & Support
- Job support with dedicated job portal
New era of Job searching..!
We have our own dedicated job site only for cyber security & SOC connected to the large no of cyber security industries and help cyber folks to get their dream jobs in cyber security field.Â
This application already connected to more than 100+ cyber security companies and our dedicated team post jobs & remind you.
FAQ's about CSA
what type of training modes available in SiemHunters..?
SiemHunters is a Unit of cyberloop & Pentesterzone offers Instructor-Led training, Live Classroom, On-demand and Self paced. most of the attendees choose live classroom training and on-demand.
Where can i take ec council exams?
SiemHunters offers ec council training and certifications in Hyderabad and Vijayawada. currently, you can attend exams in-house under our proctor vision.Â
How do i become a CSA - certified SOC Professional..?
To become a certified ethical hacker, you’ll want to follow these steps:
1. register at siemhunters Training center
2. choose your mode of training
3. Complete your training and doing all exercises with our own enterprise labs
4. Attend the exam in our center (ECC)
5. once you pass in exam, you will become a certified SOC Analyst
After CSA, what type of roles i expected?
After earn your CSA certifications. you are officially certified Professional and also called as a security analyst. this below are the roles after CSA in global IT.
SOC Analyst L1 & L2
Cyber Security Analyst
Forensics Investigator
Incident Response
Malware Analyst
How SiemConnect works..?
SiemConnect already working with 100+ cyber security organizations, it helps to apply internships, cyber security jobs, and siem jobs also
how are our instructors?
All of our Highly qualified trainers are CEI certified with 10 + years of experience in global corporates in the areas of Security domain.