10 Resources for beginners to learn Threat Hunting

Bala Praneeth (Begin_hunt)
3 min readJul 17, 2022

Threat Hunting:

Threat hunting is a specific domain in cyber security that aims to identify any attacks or threats in the business organization. Threat hunters identify these attacks in the network and use tools such as EDR to detect any advanced persistent threats that might have not been detected by security tools such as firewalls, incident response teams, etc. Once the process is implemented internally, these hunters can proactively check for any threats in the outside world using threat intelligence. So threat hunting can be described as a process of identifying threats or vulnerabilities during the attack phases while Digital forensics is performed after the attack is being executed.

Resources for Threat hunting:

  1. This article highlights the methodology of threat hunting(TH) in an organization and provides insights on various TH terminologies.

Credits — @louisebyrne25

2. Certifications — @eLearnSecurity

This certification aims to provide insights and identification of threat hunting capabilities.

3. A combined security resources of books in threat research

Author — Fakhar Imam

4. Threat hunting via Sysmon by @SANSInstitute

5. This article describes the security monitoring and threat hunting process in Okta log files

Credits — @threatpunter

6. This website consists of various security lab environments for practicing purposes.

Author — @limacharlieio

7. A GitHub repo that has various TH procedures and identifies specific hunting techniques.

Author — @ThreatHuntProj

8. Training and Certification by — @SecBlueTeam

9. Blogs and In detailed technical TH video by — @immersivelabs

10. Research and scientific papers by — @CertifyGIAC

If you guys enjoyed the blog a clap would mean so much to me. It keeps me motivated to post more content on Twitter and in blogs.

Networking-

Hope this write-up was helpful. Collaboration and networking are something that I have always enjoyed. Let’s connect.

Linkedin — https://www.linkedin.com/in/balapraneeth/

Twitter — https://twitter.com/Begin_hunt

Happy hacking !!!
If you have reached this far, thank you for reading this article. Kindly feel free to point out any mistakes and do let me know where I can improve in writing and explaining in detail. Appreciate it!!. All the best.

--

--

Bala Praneeth (Begin_hunt)

Graduate Student | Passionate about Information Security | Web Application Security enthusiast | Self-motivated