Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Threat Hunting: Hypothesize and Plan

Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.

Aaron Rosenmund - Pluralsight course - Threat Hunting: Hypothesize and Plan
by Aaron Rosenmund

What you'll learn

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Hypothesize and Plan, you’ll learn hypotheses about threat actor activity and artifacts, and plan a hunt for specific APT techniques. First, you will cover the different types and methodologies used in a threat hunt, and how to process cyber threat intelligence. Next, you’ll learn to hypothesize what artifacts, what data, and what techniques you could use to hunt for threat actor activity. Finally, you’ll create a comprehensive threat hunting plan that will be executed over the course of the series. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to implement proactive detections in your environment.

Table of contents

About the author

Aaron Rosenmund - Pluralsight course - Threat Hunting: Hypothesize and Plan
Aaron Rosenmund

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.

More Courses by Aaron