Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
![Free Learning Resources Threat Intelligence with MISP Part 7 - Exporting IOCs](https://kravensecurity.com/wp-content/uploads/2023/11/Threat-Intelligence-with-MISP-Part-7-Exporting-IOCs-1-300x169.jpg)
Threat Intelligence with MISP Part 7 – Exporting IOCs
![Free Learning Resources Crown Jewel Analysis](https://kravensecurity.com/wp-content/uploads/2024/05/crown-jewel-analysis-header-300x169.jpg)
Crown Jewel Analysis: How to Figure Out What to Protect
![Free Learning Resources Estimative Language Header](https://kravensecurity.com/wp-content/uploads/2024/05/estimative-language-header-300x169.jpg)
Estimative Language: How to Assign Confidence to Your Assessments
![Free Learning Resources The Cyber Kill Chain](https://kravensecurity.com/wp-content/uploads/2024/02/structured-analytical-techniques-cyber-kill-chain-300x169.jpg)
The Cyber Kill Chain: How to Map and Analyze Cyber Attacks
![Free Learning Resources Threat Intelligence with MISP: Part 2 - Setting up MISP](https://kravensecurity.com/wp-content/uploads/2023/09/Threat-Intelligence-with-MISP-Part-2-Setting-up-a-MISP-300x169.jpg)
Threat Intelligence with MISP: Part 2 – Setting up MISP
![Free Learning Resources Lock & Load I: The Holy Bible of Threat Intelligence](https://kravensecurity.com/wp-content/uploads/2023/02/Lock-Load-I-The-Holy-Bible-of-Threat-Intelligence-2-300x169.jpg)
MITRE ATT&CK Framework: Holy Bible of Threat Intelligence
![Free Learning Resources Visual Threat Intelligence Book Review](https://kravensecurity.com/wp-content/uploads/2023/09/visual-threat-intelligence-book-review-300x169.jpg)
Visual Threat Intelligence: A Masterpiece of Infographics and Storytelling
![Free Learning Resources The Indicator Lifecycle](https://kravensecurity.com/wp-content/uploads/2024/01/the-indicator-lifecycle-header-300x169.jpg)
What Is the Indicator Lifecycle? A Guide to Using Indicators
![Free Learning Resources Threat Intelligence vs Threat Hunting What is the Perfect Pipeline](https://kravensecurity.com/wp-content/uploads/2023/05/Threat-Intelligence-vs-Threat-Hunting-What-is-the-Perfect-Pipeline-300x169.jpg)
Threat Intelligence vs Threat Hunting: What is the Perfect Pipeline?
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.![Free Learning Resources Threat Intelligence vs Threat Hunting What is the Perfect Pipeline](https://kravensecurity.com/wp-content/uploads/2023/05/Threat-Intelligence-vs-Threat-Hunting-What-is-the-Perfect-Pipeline-300x169.jpg)
Threat Intelligence vs Threat Hunting: What is the Perfect Pipeline?
![Free Learning Resources Hunting for Persistence with Cympire - Scheduled Task Persistence](https://kravensecurity.com/wp-content/uploads/2023/03/Hunting-for-Persistence-with-Cympire-Part2-Scheduled-Tasks-300x169.jpg)
Hunting for Persistence with Cympire: Part II — Scheduled Tasks
![Free Learning Resources Hunting for Persistence with Cympire - Service Persistence](https://kravensecurity.com/wp-content/uploads/2023/04/Hunting-for-Persistence-with-Cympire-Part3-Services-300x169.jpg)
Hunting for Persistence with Cympire: Part III — Services
![Free Learning Resources Python Threat Hunting Tools: Part 8 — Parsing JSON](https://kravensecurity.com/wp-content/uploads/2023/06/Python-Threat-Hunting-Tools-Part-8-—-Parsing-JSON-300x169.jpg)
Python Threat Hunting Tools: Part 8 — Parsing JSON
![Free Learning Resources Netlas.io Tools](https://kravensecurity.com/wp-content/uploads/2024/01/netlas-for-threat-hunting-header-300x169.jpg)
Netlas.io: A Powerful Suite of Tools for Threat Hunting
![Free Learning Resources The Courses of Action Matrix (CoA)](https://kravensecurity.com/wp-content/uploads/2024/01/the-course-of-action-matrix-header-300x169.jpg)
Unraveling the Courses of Action Matrix: Full Guide to CoA
![Free Learning Resources Threat Hunting With Velociraptor I - Introduction](https://kravensecurity.com/wp-content/uploads/2022/07/Threat-Hunting-with-Velociraptor-I-Introduction-1-300x169.jpg)
Threat Hunting With Velociraptor I – Introduction
![Free Learning Resources Threat Hunting With Velociraptor II - Environment Setup](https://kravensecurity.com/wp-content/uploads/2022/10/Threat-Hunting-With-Velociraptor-II-Environment-Setup-1-300x169.jpg)
Threat Hunting With Velociraptor II – Environment Setup
![Free Learning Resources Hunting for Persistence with Cympire - Startup Folder](https://kravensecurity.com/wp-content/uploads/2023/04/Hunting-for-Persistence-with-Cympire-Part4-Startup-Folder-300x169.jpg)
Hunting for Persistence with Cympire: Part IV — Startup Folder
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
![Free Learning Resources Python Threat Hunting Tools: Part 9 — Creating Python Packages with Poetry](https://kravensecurity.com/wp-content/uploads/2023/06/Python-Threat-Hunting-Tools-Part-9-—-Creating-Python-Packages-with-Poetry-300x169.jpg)
Python Threat Hunting Tools: Part 9 — Creating Python Packages with Poetry
![Free Learning Resources Python Threat Hunting Tools: Jupyter Notebook](https://kravensecurity.com/wp-content/uploads/2023/11/python-therat-hunting-tools-p11-300x169.jpg)
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
![Free Learning Resources How to Create a Home Lab - Virtualise all the Things](https://kravensecurity.com/wp-content/uploads/2022/04/How-to-Create-a-Home-Lab-Virtualise-all-the-Things-300x169.jpg)
How to Create a Home Lab: Virtualize all the Things!
![Free Learning Resources How to Build the Ultimate Enterprise-Ready Incident Response Playbook](https://kravensecurity.com/wp-content/uploads/2023/11/playbook-300x169.jpg)
How to Build the Ultimate Enterprise-Ready Incident Response Playbook
![Free Learning Resources Let Us Find Out Whodunit](https://kravensecurity.com/wp-content/uploads/2023/01/Let-Us-Find-Out-Whodunit-300x169.jpg)
Let Us Find Out Whodunit
![Free Learning Resources Python Threat Hunting Tools: Part 8 — Parsing JSON](https://kravensecurity.com/wp-content/uploads/2023/06/Python-Threat-Hunting-Tools-Part-8-—-Parsing-JSON-300x169.jpg)
Python Threat Hunting Tools: Part 8 — Parsing JSON
![Free Learning Resources Python Threat Hunting Tools: Part 12 - MISP and CrowdStrike Falcon Integration](https://kravensecurity.com/wp-content/uploads/2023/11/misp-and-crowdstrike-integration-2-300x169.jpg)
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
![Free Learning Resources Python Threat Hunting Tools Part 1 - Why?](https://kravensecurity.com/wp-content/uploads/2023/05/python-theat-hunting-tools-part1-why-300x169.jpg)
Python Threat Hunting Tools: Part 1 — Why?
![Free Learning Resources Python Threat Hunting Tools Part 7 — Parsing CSV](https://kravensecurity.com/wp-content/uploads/2023/06/Python-Threat-Hunting-Tools-Part-7-—-Parsing-CSV-300x169.jpg)
Python Threat Hunting Tools Part 7 — Parsing CSV
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.