Book

The Foundations of Threat Hunting

Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

8h12m

Language

English

About Book

Who Is This Book For?

This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.

Book content

chapters 8h12m total length

An Introduction to Threat Hunting

Requirements and Motivations

Team Construct

Communication Breakdown

Methodologies

Threat Intelligence

Planning

Defending the Defenders

Hardware and Toolsets

Data Analysis

Documentation

Deliverables

Post-Hunt Activity and Maturing A Team

Appendix

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required