Core technical questions specific to threat hunting and intelligence analysis.
Threat intelligence, TTP analysis, data correlation
Data collection, analysis, investigation, documentation
Risk assessment, threat landscape, business impact
Scripts, tools, workflows, continuous monitoring
IOC analysis, TTP mapping, attribution, context
Adversary profiling, attack vectors, impact assessment
Source credibility, accuracy, relevance, timeliness
Integration, enrichment, automation, management
Data mining, pattern recognition, anomaly detection
Baseline establishment, deviation detection, correlation
YARA rules, SIEM rules, custom signatures
ML models, anomaly detection, predictive analytics
Registry analysis, scheduled tasks, service monitoring
Traffic analysis, protocol analysis, anomaly detection
Authentication logs, network connections, privilege escalation
Memory forensics, process analysis, malware detection
Real-world scenarios to test your practical threat hunting skills.
Advanced threat detection, long-term persistence, evasion
Early warning detection, lateral movement, data access
Behavioral analysis, data access patterns, privilege abuse
Third-party access, unusual connections, data exfiltration
Feed integration, enrichment, automated detection
Script development, workflow automation, continuous hunting
Evidence collection, analysis, communication, remediation
Program design, metrics, reporting, continuous improvement
Essential tools and technologies every threat hunter should know.