This comprehensive field manual shows you how to to use network telemetry to hunt for:
- Spearphishing attacks
- Automated exfiltration
- Lateral movement
Plus, more than twenty additional adversary tactics and techniques.
You will learn:
- Why threat hunting matters and why network data is key
- How to find dozens of adversary tactics and techniques
- How to use Corelight and Zeek evidence for hunting
Corelight provides security teams with network evidence so they can protect the world's most critical organizations and companies.