The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Cyber threat hunting is an active cyber defense activity. It has been defined as "the process of proactively and iteratively searching through networks and endpoints to detect and isolate advanced threats that evade existing security solutions.”
Individuals often think that threat hunting simply involves sifting through system logs hoping that something will “jump out” at them. Yes, analyzing system logs is one aspect or level of threat hunting, but only if the hunter knows what he/she is looking for. True threat hunting is much more involved than that.
Learning Objectives:
Understand what is threat hunting.
Know how it can help organizations in fighting against adversaries.