| Management number | 220024624 | Release Date | 2026/05/03 | List Price | $19.00 | Model Number | 220024624 | ||
|---|---|---|---|---|---|---|---|---|---|
| Category | |||||||||
Develop actionable strategies to proactively hunt advanced persistent threats and detect zero-days using CTI and behavior-based detection techniquesKey FeaturesIntelligence-led threat hunting framework for detecting APTs and zero-day attacks at scaleHands-on detection of stealthy adversaries using behavioral analytics and machine learningReal-world hunting workflows across cloud, hybrid, and enterprise environmentsBook DescriptionModern adversaries rely on stealth, living-off-the-land techniques, and zero-day exploitation to evade traditional security controls. This practical guide shows experienced defenders how to move beyond reactive alerts and build a proactive threat hunting capability driven by cyber threat intelligence.Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You’ll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise.Through hands-on exercises, you’ll apply behavioral analytics, detection engineering, and machine learning–based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration.By the end of this book, you’ll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.What you will learnBuild CTI-driven hypotheses for proactive threat huntingDetect APT behavior across the Cyber Kill ChainIdentify zero-day activity using behavioral analyticsApply MITRE ATT&CK to map adversary TTPsUse machine learning for anomaly-based detectionHunt post-exploitation activity and lateral movementInvestigate threats in cloud and hybrid environmentsDesign a scalable, resilient threat hunting programWho this book is forThis book is tailored for experienced, mid-to-senior level cybersecurity professionals operating in roles focused on proactive defense. The audience includes cyber threat hunters, cybersecurity analysts, cyber intelligence analysts, and incident responders. These profiles are looking to bridge the gap between intelligence production and its actionable application in live hunting operations, and this book will help them to achieve this.Table of ContentsRevisiting CTI for Advanced Threat HuntingUnderstanding APTs – Actors, Motivations and TTPsDeep Dive: CTI Collection and Enrichment for APTsCore Principles of Proactive Threat HuntingMastering Data Sources for Deep DivesHunting Zero-Days Through Behavioural SignaturesAdvanced Hunting Techniques and QueriesHunting Delivery and Initial AccessHunting Exploitation and ExecutionHunting Persistence and Privilege EscalationHunting Lateral Movement and DiscoveryHunting Command and Control (C2)Hunting Collection and ExfiltrationAttribution – Challenges and TechniquesBehavioural Clustering for Zero-Day DetectionHunting in Cloud and Specialized EnvironmentsBuilding a Resilient Threat Hunting ProgramEmerging Trends in Threat Hunting and CTI Read more
| ISBN10 | 1806380390 |
|---|---|
| ISBN13 | 978-1806380398 |
| Language | English |
| Publisher | Packt Publishing - ebooks Account |
| Dimensions | 1 x 7.5 x 9.25 inches |
| Item Weight | 2.45 pounds |
| Print length | 442 pages |
| Publication date | May 11, 2026 |
If you notice any omissions or errors in the product information on this page, please use the correction request form below.
Correction Request Form