How to build a Threat Hunting platform using ELK Stack
In this article we will walk through the required skills to hunt threats using the ELK Stack. In this article you will find a useful downloadable sheet that contains some good resources to help you conduct a Threat hunting operation.
In this article we are going to cover:
- Threats and Risk analysis
- Threat Hunting methodology
- Hunting maturity model
- The Cyber Kill Chain
- The Diamond Model of Intrusion Analysis
- Threat Hunting with ELK stack
How to build a Threat Hunting platform using ELK Stack
Tags: security, ELK, elasticsearch