Lesson 57: Threat Hunting

Threat hunting is proactively searching for attackers who bypass security controls. Instead of waiting for alerts, analysts look for suspicious behavior manually.

Example:
An analyst finds a user logging in at 3 AM from a foreign IP address.
Exercise: Review fake logs and identify abnormal user behavior.