Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
Find our recommended books to learn more about Threat Hunting
1. Cybersecurity-Threat Hunting Process (C-THP) Roadmap
This is the 2021 Update as a complete guide to building your own in-house Cyber Threat Hunt Capability. This is a book for advanced cybersecurity personnel and does demand additional resources to support its implementation. In this SECOND EDITION, the author adds several key improvements. He adds a chapter on Mission Planning. How to create a tactical planning process from your Incident Response team to your Cybersecurity Threat Intelligence (CTI) analysts to your Hunt team.
2. Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases is having an amazing impact on Security Operations worldwide. BTHb: SOCTH is the go to guiding book for new staff at a top 10 MSSP, integrated into University curriculum, and cited in top ten courses from a major information security training company.
3. Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.
4. Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros. In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences.
5. Practical Threat Intelligence and Data-Driven Threat Hunting
Threat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.
This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.
6. Endpoint Detection And Response A Complete Guide – 2020 Edition
This Endpoint Detection And Response Guide is unlike books you’re used to. If you’re looking for a textbook, this might not be for you. This book and its included digital components is for you who understands the importance of asking great questions. This gives you the questions to uncover the Endpoint Detection And Response challenges you’re facing and generate better solutions to solve those problems.