Event details
Mandiant Academy Training Event
- Course: Threat Hunting with Google
- Date: Tuesday, April 1, 2025 – Wednesday, April 2, 2025
- Time: 9:00 AM–5:00 PM, daily
- Time Zone: (UTC-04:00) Eastern Time (US & Canada)
- Cost: $4,000 USD or 4 EOD units
- Delivery Method: Instructor-led, in-person delivery
- Location: Google Reston
1900 Reston Metro Plaza
Reston, VA 20190
USA - Breakfast and Lunch are included.
At a glance
Threat Hunting with Google workshop covers the fundamentals of each MITRE top ten techniques and top five sub-techniques identified by Mandiant in the annual M-Trends report. The workshop is focused on hands-on exploration of artifact examples and methods for detection, reinforcing learner's practical application of the most used techniques by attackers across MITRE tactics.
Learners are invited into the ThreatSpace range for the practical application of finding artifacts associated with the techniques to uncover threat actor activity. Throughout the course, learners will gain hands-on experience hunting for threat actor activity and will be able to apply these skills in their daily operations. ThreatSpace is an engaging state-of-the-art cyber range using Google Cloud Security tools and a virtualized enterprise within Google Cloud for detecting and responding to threat actor activities. In this delivery, security professionals access a virtual environment that emulates real-world IT infrastructure, including network segments, workstations, servers, and applications. This environment enables the practice of responding to cyber threats in a controlled environment without incurring actual consequences.
Course goals
The workshop has the following objectives:
- Define the top MITRE ATT&CK Techniques
- Determine the appropriate artifacts to threat hunt for each technique
- Perform threat hunting across the top techniques in each tactic
- Detect attacker Tactics, Techniques, and Procedures (TTPs) within Google Security Operations
- Define potential false positives associated with techniques
Who this course helps
The workshop is intended for any information security professional responsible for security operations, incident response, or threat hunting within their organization. The workshop is designed for an audience at the beginner to intermediate level in their professional growth.
What to bring
A laptop with the latest Chrome browser and wireless connectivity.
Course materials
Students will receive electronic versions of all relevant course materials.