Right now, an intruder may be lurking in your network, silently mapping your infrastructure and siphoning off sensitive data. Can you spot the subtle signs ? Cyber threat hunting is a security practice aimed at uncovering network and software threats that slip past monitoring and detection systems, and other reactive techniques. In this practical book, author Nadhem AlFardan uses real-world scenarios to help you think like a threat hunter and maximize the success of your expeditions.
Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals : formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection.
Using this book's downloadable dataseis and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. What's Inside A threat hunting framework and toolkit ; Think like an adversary ; Effective threat hunting operations. For security, network, and systems professionals with some Python experience.
Right now, an intruder may be lurking in your network, silently mapping your infrastructure and siphoning off sensitive data. Can you spot the subtle signs ? Cyber threat hunting is a security practice aimed at uncovering network and software threats that slip past monitoring and detection systems, and other reactive techniques. In this practical book, author Nadhem AlFardan uses real-world scenarios to help you think like a threat hunter and maximize the success of your expeditions.
Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals : formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection.
Using this book's downloadable dataseis and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. What's Inside A threat hunting framework and toolkit ; Think like an adversary ; Effective threat hunting operations. For security, network, and systems professionals with some Python experience.