So you’ve studied threat hunting methodology and researched all the threat hunting tools… but how do you actually apply all this knowledge into doing a real threat hunt?
In this webcast, Chris Brenton will walk through using Zeek and RITA to do a full hunt from the initial review of the data, through identifying which host is compromised to pinpoint what (if any) data has been exfiltrated.
Join our Threat Hunter Community Discord Server to join in on the conversation during and after the webcast: https://discord.gg/threathunter