Hunting for Hidden Threats:
Incorporating Threat Hunting Into Your Security Program
Incorporating Threat Hunting Into Your Security Program
Contents
Contents
Introduction
Threat Hunting vs
The 5 'W's
The Pyramid of Pain
How to Hunt
The Aftermath
Conclusion
Tools for Threat Hunting
About the Cisco Cybersecurity Series
Thank you for reading Hunting for Hidden Threats
icon-print-cisco
Created with Sketch.