Book Content
chapters • 13h16m total length
1. What is Cyber Threat Intelligence?
2. What is Threat Hunting?
3. Where Does the Data Come From?
4. Mapping the Adversary
5. Working with Data
6. Emulating the Adversary
7. Creating a Research Environment
8. How to Query the Data
9. Hunting for the Adversary
10. Importance of Documenting and Automating the Process
11. Assessing Data Quality
12. Understanding the Output
13. Defining Good Metrics to Track Success
14. Engaging the Response Team and Communicating the Result to Executives














