Table of Contents
- Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks
- Hunting Concepts, Methodologies, and Techniques
- Introduction to the Elastic Stack
- Building Your Hunting Lab – Part 1
- Building Your Hunting Lab – Part 2
- Data Collection with Beats and Elastic Agent
- Using Kibana to Explore and Visualize Data
- The Elastic Security App
- Using Kibana to Pivot Through Data to Find Adversaries
- Leveraging Hunting to Inform Operations
- Enriching Data to Make Intelligence
- Sharing Information and Analysis

