Threat Hunting
(On Demand)


Simulate malicious activity with a detailed walkthrough in our lab environment, where you can learn how to best identify vulnerabilities and known attack methodologies.




This course is closed for enrollment.