Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Defenses
Data Sources
Mitigations
Enterprise
Mobile
ICS
Assets
CTI
Groups
Software
Campaigns
Resources
Get Started
Learn More about ATT&CK
ATT&CKcon
ATT&CK Data & Tools
FAQ
Engage with ATT&CK
Legal & Branding
Search
ATT&CKcon 5.0 returns October 22-23, 2024 in McLean, VA. Register for in-person participation
here
. Stay tuned for virtual registration!
Home
Resources
Learn More about ATT&CK
Training
TTP-Based Threat Hunting and Detection Engineering
Jump to Section
Module 1: Threat Hunting Fundamentals
Module 2: Developing Hypotheses & Abstract Analysis
Module 3: Determing Data Requirements
Module 4: Identify and Mitigate Data Collection Gaps
Module 5: Implement and Test Analytics
Module 6: Hunt and Investigation
TTP-Based Threat Hunting and Detection Engineering Training
Modules
Threat Hunting Fundamentals
MODULE 1
Video
Threat Hunting and Detection Engineering - Fundamentals Part 1
Threat Hunting and Detection Engineering - Fundamentals Part 2
Threat Hunting and Detection Engineering - Fundamentals Part 3
Threat Hunting and Detection Engineering - Fundamentals Part 4
Threat Hunting and Detection Engineering - Fundamentals Part 5
Developing Hypotheses & Abstract Analysis
MODULE 2
Video
Threat Hunting and Detection Engineering - Hypotheses Part 1
Threat Hunting and Detection Engineering - Hypotheses Part 2
Threat Hunting and Detection Engineering - Hypotheses Part 3
Threat Hunting and Detection Engineering - Hypotheses Part 4
Threat Hunting and Detection Engineering - Hypotheses Part 5
Threat Hunting and Detection Engineering - Hypotheses Part 6
Threat Hunting and Detection Engineering - Hypotheses Part 7
Threat Hunting and Detection Engineering - Hypotheses Part 8
Determing Data Requirements
MODULE 3
Video
Threat Hunting and Detection Engineering - Data Requirements Part 1
Threat Hunting and Detection Engineering - Data Requirements Part 2
Threat Hunting and Detection Engineering - Data Requirements Part 3
Identify and Mitigate Data Collection Gaps
MODULE 4
Video
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 1
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 2
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 3
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 4
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 5
Threat Hunting and Detection Engineering - Addressing Data Collection Gaps Part 6
Implement and Test Analytics
MODULE 5
Video
Threat Hunting and Detection Engineering - Tuning Analytics Part 1
Threat Hunting and Detection Engineering - Tuning Analytics Part 2
Threat Hunting and Detection Engineering - Tuning Analytics Part 3
Threat Hunting and Detection Engineering - Tuning Analytics Part 4
Threat Hunting and Detection Engineering - Tuning Analytics Part 5
Threat Hunting and Detection Engineering - Tuning Analytics Part 6
Hunt and Investigation
MODULE 6
Video
Threat Hunting and Detection Engineering - Application Part 1
Threat Hunting and Detection Engineering - Application Part 2
Threat Hunting and Detection Engineering - Application Part 3
Threat Hunting and Detection Engineering - Application Part 4
Threat Hunting and Detection Engineering - Application Part 5
Threat Hunting and Detection Engineering - Application Part 6
Threat Hunting and Detection Engineering - Application Part 7
Threat Hunting and Detection Engineering - Application Part 8
×
load more results