Part 3: Detection Validation
This part starts by looking at how we can validate the detections we create to ensure they are functioning as expected. It will introduce a couple of tools that can be used to perform validation and labs to work hands-on with those tools. The section will then end with an introduction to threat intelligence, specifically as it relates to detection engineering.
This section has the following chapters:
- Chapter 9, Detection Validation
- Chapter 10, Leveraging Threat Intelligence