Training – Advanced Network Threat Hunting

Training – Cyber Threat Hunting

Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting – Safelisting – Video Blog

Threat Hunting – C2 over DNS – Video Blog

Threat Hunting – FQDN Beacons – Video Blog

Threat Hunting – IP Based Beacons – Video Blog

How to Threat Hunt – Video Blog

What is Cyber Threat Hunting – Video Blog

Training – Cyber Threat Hunting

Webcast – Threat Hunter’s Toolbox

Webcast – AC-Hunter with Azure