Cyber Threat Hunters Handbook
Couldn't load pickup availability
ISBN: 9789365898965
eISBN: 9789365894394
Authors: David F. Pereira Quiceno
Rights: Worldwide
Edition: 2025
Pages: 330
Dimension: 7.5*9.25 Inches
Book Type: Paperback

- Description
- Table
- About
Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilities at scale.
This book offers a hands-on, practical approach to threat hunting and covers key topics such as network traffic analysis, operating system compromise detection, malware analysis, APTs, cyber threat intelligence, AI-driven detection techniques, and open-source tools. Each chapter builds the capabilities, from understanding the fundamentals to applying advanced techniques in real-world scenarios. It also covers integrating strategies for dealing with security incidents, outlining crucial methods for effective hunting in various settings, and emphasizing the power of sharing insights.
By the end of this book, readers will possess the critical skills and confidence to effectively identify, analyze, and neutralize advanced cyber threats, significantly elevating their capabilities as cybersecurity professionals.
WHAT YOU WILL LEARN
● Analyze network traffic, logs, and suspicious system behavior.
● Apply threat intelligence and IoCs for early detection.
● Identify and understand malware, APTs, and threat actors.
● Detect and investigate cyber threats using real-world techniques.
● Use techniques and open-source tools for practical threat hunting.
● Strengthen incident response with proactive hunting strategies.
WHO THIS BOOK IS FOR
This book is designed for cybersecurity analysts, incident responders, and Security Operations Center (SOC) professionals seeking to advance their proactive defense skills. Anyone looking to learn about threat hunting, irrespective of their experience, can learn different techniques, tools, and methods with this book.
1. Introduction to Threat Hunting
2. Fundamentals of Cyber Threats
3. Cyber Threat Intelligence and IoC
4. Tools and Techniques for Threat Hunting
5. Network Traffic Analysis
6. Operating Systems Analysis
7. Computer Forensics
8. Malware Analysis and Reverse Engineering
9. Advanced Persistent Threats and Nation-State Actors
10. Incident Response and Handling
11. Threat Hunting Best Practices
12. Threat Intelligence Sharing and Collaboration
David F. Pereira Quiceno is the Founder and CEO of SecPro, a published author, trainer, and digital researcher with over 28 years of experience in cybersecurity and computer forensics. He has led consulting and training initiatives across ethical hacking, malware analysis, penetration testing, and forensic investigations for many international entities. His expertise has impacted sectors such as finance, military, government, and energy. David has been recognized multiple times by EC-Council, receiving awards like Instructor of the Year and Circle of Excellence. He holds over a dozen international certifications, including CCISO, CEH, CHFI, CTIA, and more. As an educator and speaker, he has delivered specialized training for institutions like the FBI, US Marines, Secret Service, Colombia's National Police, and the CERT of multiple countries in Latin America. David is a community-active member and continues to contribute to the global cybersecurity community through teaching, public speaking, and high-impact defense projects.