Details: procurement of of x various cyber security related courses for ccosw, eastern comd" domain 3 introduction to threat hunting(0) what is threat hunting?00 what is threat intelligence?(ii) 5 whys of threat hunting(iv) introduction to endpoint threat huntingintroduction to network threat hunting(b)domain 2: threat hunting basics(0) log analysis (perimeter devices, endpoints, secunty solutions00 basics of malware analysis(1) types of threat hunting (intel driven hypothesisdriven, request driven, hybrid hunting)(iv) digital forensics and incident response(mdetection of lolbins & amp; gtfobinshunting based on ost layers (vi)brief introduction to windows logging and internais (v)(vil) brief introduction of th frameworka(x) basic of log forensics(x) osint for threat hunting(x) yara rules(c)domain 3: network threat hunting(1) networking primer from a security standpointnetwork: based attacks and in depth analysis(i) port based a
Sector: Defense