Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Defenses
Data Sources
Mitigations
Enterprise
Mobile
ICS
Assets
CTI
Groups
Software
Campaigns
Resources
Get Started
Learn More about ATT&CK
ATT&CKcon
ATT&CK Data & Tools
FAQ
Engage with ATT&CK
Version History
Legal & Branding
Benefactors
Blog
Search
Reminder: the TAXII 2.0 server will be
retiring on December 18
. Please switch to the
TAXII 2.1 server
to ensure uninterrupted service.
Home
Resources
Learn More about ATT&CK
Training
TTP-Based Threat Hunting and Detection Engineering
Jump to Section
Module 1: Threat Hunting Fundamentals
Module 2: Developing Hypotheses & Abstract Analysis
Module 3: Determing Data Requirements
Module 4: Identify and Mitigate Data Collection Gaps
Module 5: Implement and Test Analytics
Module 6: Hunt and Investigation
TTP-Based Threat Hunting and Detection Engineering Training
Modules
Threat Hunting Fundamentals
MODULE 1
Developing Hypotheses & Abstract Analysis
MODULE 2
Determing Data Requirements
MODULE 3
Identify and Mitigate Data Collection Gaps
MODULE 4
Implement and Test Analytics
MODULE 5
Hunt and Investigation
MODULE 6
×
load more results