Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools
Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method

Key Features

  • Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting
  • Dive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing data
  • Explore advanced threat hunting techniques using the MITRE ATT&CK Framework

Book Description

Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a book—it's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience. Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.

What you will learn

  • Gain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threats
  • Explore the various stages of the threat hunting process
  • Master the art of collecting and analyzing threat data
  • Familiarize yourself with the MITRE ATT&CK Framework
  • Set up a research environment using open-source tools
  • Query and analyze data to carry out atomic tests and identify potential threats
  • Discover the power of threat actor emulation

Who this book is for

If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.

1146243150
Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools
Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method

Key Features

  • Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting
  • Dive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing data
  • Explore advanced threat hunting techniques using the MITRE ATT&CK Framework

Book Description

Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a book—it's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience. Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.

What you will learn

  • Gain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threats
  • Explore the various stages of the threat hunting process
  • Master the art of collecting and analyzing threat data
  • Familiarize yourself with the MITRE ATT&CK Framework
  • Set up a research environment using open-source tools
  • Query and analyze data to carry out atomic tests and identify potential threats
  • Discover the power of threat actor emulation

Who this book is for

If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.

44.99 Pre Order
Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools

Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools

by Valentina Costa-Gazcón
Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools

Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools

by Valentina Costa-Gazcón

Paperback

$44.99 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on May 19, 2026

Related collections and offers


Overview

Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method

Key Features

  • Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting
  • Dive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing data
  • Explore advanced threat hunting techniques using the MITRE ATT&CK Framework

Book Description

Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a book—it's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience. Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.

What you will learn

  • Gain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threats
  • Explore the various stages of the threat hunting process
  • Master the art of collecting and analyzing threat data
  • Familiarize yourself with the MITRE ATT&CK Framework
  • Set up a research environment using open-source tools
  • Query and analyze data to carry out atomic tests and identify potential threats
  • Discover the power of threat actor emulation

Who this book is for

If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.


Product Details

ISBN-13: 9781803233758
Publisher: Packt Publishing
Publication date: 05/19/2026
Product dimensions: 75.00(w) x 92.50(h) x (d)

About the Author

Valentina Costa-Gazcón is a cyber threat intelligence analyst who specializes in tracking Advanced Persistent Threats (APTs) worldwide, using the MITRE ATT&CK Framework to analyze their tools, tactics, techniques, and procedures (TTPs). She is a self-taught developer and threat hunter with a degree in translation and interpretation from the Universidad de Málaga (UMA) and a cyber security diploma from Argentina's Universidad Tecnológica Nacional (UTN). Valentina also is one of the founders of the BlueSpace community (BlueSpaceSec) and one of the core members of Open Threat Research, founded by Roberto Rodriguez (OTR_Community).

Table of Contents

Table of Contents

  1. What is Cyber Threat Intelligence?
  2. What is Threat Hunting?
  3. Where does data come from?
  4. Mapping the Adversary
  5. Working with the data
  6. Emulating the Adversary
  7. Creating a research environment
  8. How to query the data
  9. Hunting for the Adversary
  10. Documenting and automating the process
  11. Assessing data quality
  12. Understanding the Output
  13. Defining Good Metrics to Track Success
  14. Communicating results to the executives
  15. Appendix
From the B&N Reads Blog

Customer Reviews