MATTHEW HOSBURGH’S

Threat Hunting: From Network Patterns to Host Logs

Threat Hunting: From
Network Patterns to
Host Logs

FREE SIGN UP BONUS: The 15-step framework I use for threat hunting

FEATURED TRAINING

MEET YOUR INSTRUCTOR

Eric Cole

Watch Now

  • What threat hunting is (and what it is not)
  • How to get started and who should be hunting
  • Basic techniques and skills utilized for successful hunts
  • The required data feeds and collectors needed to begin

FEATURED TRAINING

MEET YOUR INSTRUCTOR

David Bianco

Watch Now

  • The main goals of a hunt program
  • What a “successful hunt” really means
  • Which type of team structure fits your org
  • What skills your team needs to hunt effectively

FEATURED TRAINING

MEET YOUR INSTRUCTOR

Chris Sanders

Watch Now

  • Why it’s important to start threat hunting
  • How to pivot through data to get answers
  • What observables serve as good starting points
  • Which tools and techniques are readily available

Training taught by industry experts

Meet Your Instructors

Threat Hunter Eric Cole

Eric Cole
Secure Anchor
@drericcole

10+ years Hunting

Chris Sanders
Applied Defense
@chrissanders88

10 years Hunting

david

David Bianco
Sqrrl
@DavidJBianco

8 years Hunting