Blog
Uncategorized
Threat Hunting Hypotheses
Using the Internet locate 4 different threat hunting hypotheses. Next, determine the tools and techniques that you would use to determine if these hypotheses are valid. Finally, address the actions that you would take if each of the hypotheses were determined to be valid.
Create a table of your findings. Add any references used at the bottom of the page.