Threat Hunting BasicsTypes of Threat HuntingWorkflow of a Threat HuntNormalizing Data Sources with OSSEMData SourcesOSSEM to the RescueData-Driven Hunts Using OSSEMMITRE ATT&CK Framework Refresher: T1003.002Lab 9-1: Visualizing Data Sources with OSSEMLab 9-2: AtomicRedTeam Attacker EmulationExploring Hypothesis-Driven HuntsLab 9-3: Hypothesis that Someone Copied a SAM FileCrawl, Walk, RunEnter MordorLab 9-4: Hypothesis that Someone Other than an Admin Launched PowerShellThreat Hunter PlaybookDeparture from HELK for NowSpark and JupyterLab 9-5: Automated Playbooks and Sharing of AnalyticsSummaryFor Further ReadingReferences