1. Introduction to Threat Hunting
- What is cyber threat hunting?
- Hunting versus Reactive Response
- Threat hunting models
2. Threat Hunting Techniques and Methodologies
- Structured hunting (MITRE)
- Unstructured hunting
- Entity driven hunting
3. Technologies in Threat Hunting Process
- Network data analysis
- Endpoint data anaysis
- Threat Intelligence
- SIEM
- EDR, XDR and MDR platforms
4. Threat Hunting - Network Analysis
- Network based threats
- Basic protocol analysis
- DNS abnormalities
- Beacon Analysis
- Volumetric Analysis
5. Threat Hunting - Endpoint Analysis
- Host-based Threats
- Mapping Attacks With MITRE Framework
- Event ID Numbers For Hunting
- Identifying Suspicious Services
- Malicious Document Analysis
6. Threat Hunting - Hands on Practice
- Adversary Emulation: Atomic Red Team + MITRE ATT&CK