How to Threat Hunt – Video Blog
Training – Advanced Network Threat Hunting
Training – Cyber Threat Hunting
Threat Hunting Process Injection With Jupyter Notebook and Sysmon
Jumping the T-Shark with Chris Brenton – Video Blog
Webcast – Threat Hunter’s Toolbox
Training – Cyber Threat Hunting
Webcast – Applying The Threat Hunter’s Runbook
Training – Cyber Threat Hunting w/ Chris Brenton
Malware of the Day – Cryptomining and Cryptojacking

Training Cyber Threat Hunting w/ Chris Brenton


Malware of the Day – Octopus