Chapter 8 - 01 - Discuss Threat Hunting - 02_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Chapter 8 - 01 - Discuss Threat Hunting - 01_ocred.pdf
- Chapter 8 - 01 - Discuss Threat Hunting - 02_ocred.pdf
- Chapter 8 - 02 - Discuss Various Threat Intelligence Feeds and Sources - 03_ocred.pdf
- Chapter 8 - 02 - Discuss Various Threat Intelligence Feeds and Sources - 04_ocred.pdf
- Module 08 - Network Security Assessment Techniques and Tools_fax_ocred.pdf
- Chapter 8 - 01 - Discuss Threat Hunting - 01_ocred_fax_ocred.pdf
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM)...
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM) (HIMIM) O The threat hunting maturity model (HMM) describes the quantity and quality of information collected from a network for investigation Q ' %y - 3 =3 » < 4 B g " [[AYA) VY Level 0: Level 1: Level 2: Level Level 33: - Level 4: ovative = Primarily *= Follows the = Adopts data = Creates (Creates | = Automates Automates depends on latest threat analysis custom data existing data automated reports reports procedures analysis analysis monitoring created by procedures procedures systems and = Moderate- Moderate- to others alerts igh- level hugh. hngh- *= High- to very- High- igh- to very