Get to grips with cyber Threat Intelligence and Data-Driven Threat hunting while exploring expert tips and techniques Key Features: Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables Threat hunting Carry out atomic hunts to start the Threat hunting process and understand the environment Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor dataset.
Get to grips with cyber Threat Intelligence and Data-Driven Threat hunting while exploring expert tips and techniques Key Features: Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables Threat hunting Carry out atomic hunts to start the Threat hunting process and understand the environment Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor dataset