Focus
Focus areas
- Step 1
Hypothesis-driven hunting mapped to MITRE ATT&CK and the Cyber Kill Chain so defenders can trace adversaries from reconnaissance to exfiltration.
- Step 2
Live hunts that blend CTI enrichment, telemetry correlation, and packet/memory analysis so candidates spot dwell-time strategies across network and endpoint layers.
- Step 3
Decision-ready communication built on practical labs using Wireshark, Splunk, ELK, and EDR telemetry plus scenario-based reporting.