Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Defenses
Data Sources
Mitigations
Enterprise
Mobile
ICS
Assets
CTI
Groups
Software
Campaigns
Resources
Get Started
Learn More about ATT&CK
ATT&CKcon
ATT&CK Data & Tools
FAQ
Engage with ATT&CK
Version History
Legal & Branding
Benefactors
Blog
Search
ATT&CK v16 has been released! Check out the
blog post
for more information.
Home
Resources
Learn More about ATT&CK
Training
TTP-Based Threat Hunting and Detection Engineering
Jump to Section
Module 1: Threat Hunting Fundamentals
Module 2: Developing Hypotheses & Abstract Analysis
Module 3: Determing Data Requirements
Module 4: Identify and Mitigate Data Collection Gaps
Module 5: Implement and Test Analytics
Module 6: Hunt and Investigation
TTP-Based Threat Hunting and Detection Engineering Training
Modules
Threat Hunting Fundamentals
MODULE 1
Developing Hypotheses & Abstract Analysis
MODULE 2
Determing Data Requirements
MODULE 3
Identify and Mitigate Data Collection Gaps
MODULE 4
Implement and Test Analytics
MODULE 5
Hunt and Investigation
MODULE 6
×
load more results