Curriculum
- 6 Sections
- 6 Lessons
- 50 Days
Expand all sectionsCollapse all sections
- Threat Hunting Concepts and Practices1
- Threat Actor Landscape Overview1
- Communication and Reporting for Threat Hunters1
- Hunting with Network Data1
- Hunting on Endpoints1
- Threat Hunting without IoCs1
This module introduces the way in which threat hunters receive and use threat intelligence, and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.
Prev
This module provides an introduction to cyber threat hunting utilizing Endpoint IoCs. It covers intelligence-based and hypothesis-based threat hunting as well as considerations that improve the effectiveness of a hunt.
Next

