LinkedIn Learning:
Threat Hunting Guides:
- Hunt Evil Your Practical Guide to Threat Hunting
- HuntPedia
- Threat Hunting Playbook
- Detecting the Unknown: A Guide to Threat Hunting
- Hunt Like a Pro: A Threat Hunting Guide
- Threat Hunting Methodology
- Building an Maturing your Threat Hunting Program
- Corelight Threat Hunting Guide
Threat Hunting Presentations:
Threat Hunting Frameworks and Methodologies:
- The Hunting Maturity Model (HMM)
- The PEAK Threat Hunting Framework
- The Pyramid of Pain
- MITRE ATT&CK Enterprise Matrix
- The Cyber Kill ChainĀ® framework
- TaHiTI: Targeted Hunting Integrating Threat Intelligence
YouTube Videos:
- Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
- Threat Hunting in Security Operation – SANS Threat Hunting Summit 2017
- Threat Hunting via Sysmon – SANS Blue Team Summit
- My “Aha!” Moments – Methods, Tips, & Lessons Learned in Threat Hunting
- Real-Time Threat Hunting – SANS Threat Hunting & Incident Response Summit 2017
- MITRE ATT&CK Framework for Threat Hunting
- Threat Hunting via DNS
- Threat Hunting with Network Flow
- Keynote: Threat Hunting: Old Data, New Tricks!
Threat Hunting Reports: