SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCyber threat intelligence (CTI) has many standards and models to define it. However, very few of these standards reach a technical level of implementation and instead leave it to the interpretation of organizations. Hunting for CTI indicators itself needs to be a well-defined process. Most organizations receive a list of indicators of compromise (IOCs) and conduct ad-hoc retroactive hunts for them within their environment for any historical hits. IOC hits are then proactively searched for in newly ingested data.