Skip to main content

Section outline

    • The Process of Investigation
    • Understanding Threat Hunting & Incident Response Relationship
    • Cyber Threat Models: Cyber Kill Chain, Diamond Model, MITRE ATT&CK
    • Developing a Threat Hunting Lab for live analysis