Practical Threat Hunting and Detection Engineering
Become the analyst who catches what others miss.
Hands-on hunting. Real detections. Production-ready skills.
Pre-Sale Now Open — Save 40%.
Write your awesome label here.
Practical Threat Hunting & Detection Engineering
Learn how modern hunters find, analyze, and detect adversary behaviors - step by step.
Learn to Detect Threats Using TTP-Based and Behavioral Techniques
Pre-Sale Now Open — Save €200.
Coming Soon
Advanced Threat Hunting & Detection Engineering in the Enterprise
Learn how to build high-order behavioral detections for Windows and Entra ID attack activity that remain resilient to evasion and can be adapted across tools, clouds, and enterprise environments.
The course is currently in beta with a few users, and will be released in May/June 2026
Join the waitlist for launch updates and early access.
A Course Built for Serious Defenders
What You’ll Gain
What Makes This Course Exceptional
Designed for Real Enterprise Conditions
Beyond Detection Content Alone
Beyond a Single Ecosystem
Join the waitlist for launch updates and early access.
What You Will Learn
By the end of this course, you will:
-
Understand the foundational concepts of databases and logging.
-
Be proficient in crafting and optimizing KQL queries for security data analysis.
-
Be able to understand hundreds of publicly shared KQL queries and easily customize them to implement in your environment.
-
Gain expertise in manipulating and combining datasets for comprehensive analysis.
-
Learn how to use threat intelligence feeds efficiently
-
Master various investigation techniques to find what you want easily and quickly. For instance:
- Time series visualization for quick triage and spotting anomalies.
- Geospatial visualization for quick triage and spotting anomalies, which is extremely useful for AiTM and other Identity focused attacks.
-
Learn rapid triage and investigation techniques.
-
Learn fundamental anomaly detection methods used in threat hunting and detection engineering
-
Master time series anomaly detection for threat hunting and detection engineering
-
Learn a novel method to detect attack flows and infection chains
-
Learn how to use KQL graph semantics for threat hunting and detection engineering
-
Test your knowledge with a final capstone that covers a full chain attack
Course Lessons (WIP)
Frequently asked questions
Who should take the course?
This course is ideal for:
- SOC Analysts and Incident Responders who want to improve their investigation skills
- Cybersecurity professionals seeking to deepen their data analysis skills.
- IT professionals and analysts interested in specializing in security data analysis using KQL.
- Beginners who are keen to learn KQL in the context of cybersecurity.
Are there any prerequisites?
A basic understanding of databases and a keen interest in cybersecurity data analysis are recommended, but the course begins with foundational concepts, making it accessible to all enthusiastic learners.
Does the course contain video content?
No. While the course is text-based, the content is supported by screenshots with explanations. This approach makes it easy to follow and understand the content. You may check the free "Introduction to KQL for Security Analysis" course to see how it looks.
Are there any prerequisites or lab requirements?
No additional software and hardware is required. You will access the lab environment via a web browser. The lab environment is an Azure Data Explorer instance where you will analyze the logs of a simulated organization.
Can I get a certificate of completion?
Yes, you will receive a certificate of completion.
What is Lemon Squeezy?
Lemon Squeezy is a Merchant of Record that processes payments and handles taxes. You may see its name on your card statements.
