LinkedIn Learning:
- Threat Hunting Essential Training
 - Threat Hunting: Network Data
 - Insider Threat Hunting: Detecting and Responding to Internal Security Risks
 
Threat Hunting Guides:
- Hunt Evil Your Practical Guide to Threat Hunting
 - HuntPedia
 - Threat Hunting Playbook
 - Detecting the Unknown: A Guide to Threat Hunting
 - Hunt Like a Pro: A Threat Hunting Guide
 - Threat Hunting Methodology
 - Building an Maturing your Threat Hunting Program
 - Corelight Threat Hunting Guide
 
Threat Hunting Presentations:
Threat Hunting Frameworks and Methodologies:
- The Hunting Maturity Model (HMM)
 - The PEAK Threat Hunting Framework
 - The Pyramid of Pain
 - MITRE ATT&CK Enterprise Matrix
 - The Cyber Kill ChainĀ® framework
 - TaHiTI: Targeted Hunting Integrating Threat Intelligence
 
YouTube Videos:
- Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
 - Threat Hunting in Security Operation – SANS Threat Hunting Summit 2017
 - Threat Hunting via Sysmon – SANS Blue Team Summit
 - My “Aha!” Moments – Methods, Tips, & Lessons Learned in Threat Hunting
 - Real-Time Threat Hunting – SANS Threat Hunting & Incident Response Summit 2017
 - MITRE ATT&CK Framework for Threat Hunting
 - Threat Hunting via DNS
 - Threat Hunting with Network Flow
 - Keynote: Threat Hunting: Old Data, New Tricks!
 
Threat Hunting Reports:
