Threat hunters proactively search for hidden threats that evade automated detection. Using hypothesis-driven analysis and deep knowledge of attacker behavior, they find what security tools miss.
The best threat hunters combine analytical rigor with creative intuition. They form hypotheses from threat intelligence, test them systematically against telemetry data, and turn successful hunts into permanent detections that raise the security baseline.
You're learning to formulate hypotheses, query SIEM data effectively, and map your hunts to ATT&CK techniques. Every hunt - even those that find nothing - teaches you what normal looks like in your environment.
Forming hypotheses around script execution and process anomalies teaches the fundamentals of hunt methodology
Command and Scripting Interpreter (T1059), Windows Management Instrumentation (T1047)
Hunting for reconnaissance activity - unusual account enumeration, network scanning - reveals attackers in the early stages
Account Discovery (T1087), Network Service Discovery (T1046)
Threat detection and analysis
250h study · 3yr validity · 50 CPE · $75/yr CE fee
Advanced SIEM queries
150h study · 3yr validity · Free (retake exam)
Sign up free to explore these topics with AI-powered guidance.
You're developing hunt playbooks, using statistical analysis to spot anomalies, and hunting for threats without relying on IOCs. You're starting to think about how to operationalize your findings into automated detections.
Proactively hunting for credential theft - DCSync, Kerberoasting, LSASS access - catches threats that bypass automated detection
OS Credential Dumping (T1003), Steal or Forge Kerberos Tickets (T1558)
Statistical analysis of RDP sessions, SMB connections, and authentication patterns reveals anomalous movement through the network
Remote Services (T1021), Pass the Hash (T1550.002)
Incident handling — foundational for hunting
350h study · 4yr validity · 36 CPE · $479/yr
Threat intelligence — informs hunt hypotheses
300h study · 4yr validity · 36 CPE · $479/yr
Sign up free to explore these topics with AI-powered guidance.
You're designing the hunt program - setting priorities from threat intelligence, measuring dwell time reduction, and applying data science techniques to find threats at scale. Your hunts shape the organization's detection strategy.
Hunting for C2 beaconing patterns, DNS tunneling, and covert channels using data science techniques finds the most sophisticated threats
Application Layer Protocol (T1071), Non-Standard Port (T1571)
Hypothesis-driven hunting for evasion techniques - process hollowing, timestomping, rootkits - defines the frontier of threat hunting
Process Injection (T1055), Rootkit (T1014)
Advanced forensic analysis — deep artifact hunting
400h study · 4yr validity · 36 CPE · $479/yr
Sign up free to explore these topics with AI-powered guidance.
Free to use. No credit card required.
Get Started FreeAsk your first question in seconds.