<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;</provider_name><provider_url>https://hide01.ir</provider_url><title>&#x62F;&#x648;&#x631;&#x647; OffSec - TH-200: Foundational Threat Hunting</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="1TSLToaDL1"&gt;&lt;a href="https://hide01.ir/offsec-th200-foundational-threat-hunting/"&gt;&#x62F;&#x648;&#x631;&#x647; OffSec &#x2013; TH-200: Foundational Threat Hunting&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hide01.ir/offsec-th200-foundational-threat-hunting/embed/#?secret=1TSLToaDL1" width="600" height="338" title="&#x201C;&#x62F;&#x648;&#x631;&#x647; OffSec &#x2013; TH-200: Foundational Threat Hunting&#x201D; &#x2014; &#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;" data-secret="1TSLToaDL1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hide01.ir/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://hide01.ir/wp-content/uploads/2025/02/TH-200-Logo-hide01.ir_.png</thumbnail_url><thumbnail_width>938</thumbnail_width><thumbnail_height>938</thumbnail_height><description>Foundational Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by enterprises to track and mitigate adversaries. Key areas include understanding the threat actor landscape, with a focus on ransomware and Advanced Persistent [&hellip;]</description></oembed>
