The Foundations of Threat Hunting
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
Offered by
Difficulty Level
Intermediate
Completion Time
8h12m
Language
English
About Book
Who Is This Book For?
This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.
The Foundations of Threat Hunting
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 8h12m total length
An Introduction to Threat Hunting
Requirements and Motivations
Team Construct
Communication Breakdown
Methodologies
Threat Intelligence
Planning
Defending the Defenders
Hardware and Toolsets
Data Analysis
Documentation
Deliverables
Post-Hunt Activity and Maturing A Team
Appendix
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!