front matter

 

foreword

If you work in security, you’ve likely heard the buzz about threat hunting. But what is threat hunting, really? Is it a fancy term for “looking for bad stuff,” or is there more to it? This book (Cyber Threat Hunting) aims to answer these questions and more, taking you on a journey from the basics to the nitty-gritty of building a threat-hunting practice. I love that it starts with a clear definition!

What’s inside

This book isn’t just theory. It’s also full of practical advice, real-world examples, and even hands-on exercises. You’ll learn about the following:

  • The threat-hunting mindset—Threat hunting isn’t your grandma’s security. It’s about being proactive, assuming breaches, and relentlessly pursuing the bad guys.
  • Building a framework—You won’t be hunting in the dark. The book guides you through creating a structured, repeatable process for your hunts.
  • Tools and techniques—You’ll get a toolbox full of methods, from basic searches to advanced analytics, to uncover hidden threats.
  • Hunting in the cloud—Let’s face it, the cloud is where a lot of the action is these days.

Who should read it

This book isn’t for the faint of heart, as it goes deep in some areas. It’s aimed at security pros who are ready to roll up their sleeves and get a threat-hunting program started. You’ll need some basic knowledge of security controls, networking, and operating systems.

Why I recommend it

preface

acknowledgments

about this book

Who should read this book

How this book is organized: A road map

About the code

liveBook discussion forum

about the author

about the cover illustration