Section 2: Understanding the Adversary
The second section of this book is focused on understanding a crucial part of the threat hunting process: how to emulate the adversary. In this section, you will learn how to replicate the adversary's behavior in the environment we are going to set up. This will allow you to carry out your hunts from a data-driven threat intelligence viewpoint.
This section comprises the following chapters:
- Chapter 4, Mapping the Adversary
- Chapter 5, Working with Data
- Chapter 6, Emulating the Adversary