Index of /LabFiles/SOC-Security-Operations-Center/4 Threat Hunting
Parent Directory
Hunt team - WHO.JPG
IOC-Focused Threat Hunting.JPG
The OODA Loop.JPG
The Pyramid of Pain and Analytic Types.JPG
The two types of games - Sinek's Main Points.JPG
The two types of games - playing with an infinite strategy.JPG
The two types of games.JPG
Threat Hunting - IOC Focused.JPG
Threat Hunting - attack tactic-focused hunting.JPG
Threat Hunting - attack technique-focused hunting.JPG
Threat Hunting - hunting maturity model.JPG
Threat Hunting - hunting via Anomaly Investigation.JPG
Threat Hunting - showing the value of hunting.JPG
Threat Hunting - suggested Hunting Sessions.JPG
Threat Hunting - threat actor-focused hunting.JPG
Threat Hunting - threat hunting Summary.JPG
Threat Hunting Process Overview.JPG
Threat Intel - SOC interface.JPG
Threat Intel Levels.JPG
Threat Intelligence Quality.JPG
When to move to active defense.JPG
Which game are you playing.JPG
the need for threat intelligence.JPG