Table of ContentsIntroduction to Cyber Threat Intelligence, Analytical Models, and FrameworksHunting Concepts, Methodologies, and TechniquesIntroduction to the Elastic StackBuilding Your Hunting Lab – Part 1Building Your Hunting Lab – Part 2Data Collection with Beats and Elastic AgentUsing Kibana to Explore and Visualize DataThe Elastic Security AppUsing Kibana to Pivot Through Data to Find AdversariesLeveraging Hunting to Inform OperationsEnriching Data to Make IntelligenceSharing Information and Analysis.
Note: Description based on CIP data; resource not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.