Threat Hunting Workshop 5: Hunting for Credential Access | Intel 471 Skip to content

Threat Hunting Workshop 5: Hunting for Credential Access

Homepage Hero

You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through your own data. But you have also probably noticed that learning to threat hunt isn’t as easy as it could be. Or should be. That is why Intel 471 is offering another first-of-its-kind interactive threat hunting workshop where anyone can learn how to threat hunt in a safe, fun, and dynamic environment!

Join Intel 471's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006). The workshop will dive into the critical areas of credential access including the mechanics of credential access, what the adversaries are looking for, some of the tricks of the trade and it will look at some of the most common techniques used for credential access and most importantly how threat hunters and organizations can hunt for signs and traces of credential access in their environment.

This Credential Access workshop isn't going to be just your typical webinar, however. It is LIVE and FULLY INTERACTIVE!

Intel 471 is outfitting every student with their own enterprise-grade threat hunting environment with real life data that they can practice behavioral threat hunting on. Each participant will also receive FREE access to some of the leading hunting tools that they can use for the workshop and then even take home with them!

And, continuing in our threat hunting certification series, every participant that completes the final credential access challenge will be issued their very own Threat Hunting - Credential Access (Level I) certification and badge that they can proudly display on social media that proves they have mastered basic defense evasion hunting!

Join us for an immersive, educational, and fun threat hunting experience that will help you Begin Your Hunt.

Some of the topics this workshop will cover are:

  • The basics of credential access including the most common mechanisms used and techniques that are most likely to be used by adversaries.
  • Realistic scenarios, with real data, involving an adversary that will use some of the most widely adopted tactics, techniques, and procedures (TTPs).
  • Access to an arsenal of real tools, including a hunting environment and exclusive free access to dozens of threat hunting packages that will enable participants to execute complex behavioral threat hunting.
  • A guided session by an instructor that will walk participants, step-by-step, through the hunt showing them tips and tricks of the trade!
  • Access to an exclusive community forum of other threat hunters where you can ask questions, get advice, and build your network!
  • Attendees that successfully complete the final challenge will be issued an official Intel 471 certification: Credential Access Hunting - Level I!

Watch the Webinar

CTA Background