
- [x] Introduction to Threat Hunting
- [x] Hunting the Network & Network Analysis
- [x] Hunting the Endpoint & Endpoint Analysis
<aside>
💡 WHAT I LEARN!
- IoC creation
- Network Hunting (Wireshark, Zeek, Network Miner)
- Hunting Memory (Volatility)
- Hunting Malware (Mandiant)
- Hunting .NET Malware
- Hunting across the entire cyber kill chain (Initial Access, Attack Vectors/Payloads used, Enumeration, Lateral Movement, Privilege Escalation, Persistence, etc.) with SIEM [Splunk, ELK]
</aside>
Introduction to Threat Hunting
Threat Hunting Terminology
Threat Intelligence
Threat Hunting Hypothesis
Hunting the Network & Network Analysis
Hunting the Endpoint & Endpoint Analysis