Discover how to create your own threat hunting environment and use the free Digital Forensics and Incident Response tool Velociraptor to hunt down threats.
Learn what threats are, what threat hunting is, and the basic security requirements needed to start a threat hunting program in this series introduction.
Discover how to create a virtualized threat hunting environment and use Velociraptor as a threat hunting tool to sniff out malicious reverse shells.
Learn how to use Velociraptor’s threat hunting capabilities to identify malicious activity associated with real-world malware and threat actors in this demo.
If you want more of a challenge, take on one of their certification exams and land your next job in cyber: