Summary
In this chapter, we learned how to load data into a HELK instance, how to hunt for advanced persistent threat emulation with Mordor datasets, how to emulate our own adversaries using CALDERA, and how to build Sigma rules for our detections. Now, the only thing left for you to do is keep practicing so that you can improve your hunting skills!
In the next chapter, we are going to discuss how to assess the quality of our data and how to update our hunting process.