Skip to main content

Section outline

    • Threat Hunting Using Security Tools:
      • Cuckoo Sandbox for Malware Analysis
      • Splunk & ELK for Threat Intelligence & Log Analysis
      • Security Onion for Intrusion Detection
      • Mandiant Redline for Forensics & Threat Intelligence
    • Case Study & Practical Lab:
      • Real-world Threat Hunting Scenarios
      • Automation & Continuous Threat Intelligence Improvement