Hover a category to view courses…
Topics:
Hunting maturity model
Creating hypotheses
Data-driven hunting
MITRE ATT&CK deep-dive
Lateral movement indicators
Credential dumping patterns
Detecting stealthy C2
Unusual network patterns
Abnormal process execution
Assignment:Write 3 hunting hypotheses + expected data sources.
Documenting detection gaps
Recommendations for SIEM rules
Executive summaries