• Introduction the Threat Hunting
• What Motivates Cyber Attacks
• What are the Cyber Attack Methods
• Attacker Who Prepare Cyber Attack
• Place Where Prepare Cyber Attack
• Threat Hunting Fundamentals
• Pyramid of Pain
• TTP - Tactics, Techniques and Procedure
• IOC - Indicators of Compromise
• STIX - Structed Threat Information Expression
• Cybox - Cyber Observable eXpression
• IOC Scanners
• OODA Loop
• Cyber Kill Chain Model
• MITRE ATT&CK Model
• Fireeye Attack Lifecycle
• Threat Intelligence
• OSINT - Open Source Intelligence
• Honeypots
• Dark Web
• Collect data on Network Equipment
• Threat Intelligence Feed and Sharing
• Strategic Cyber Threat Intelligence
• Operational Cyber Threat Intelligence
• Tactical Cyber Threat Intelligence
• Threat Hunting Methodologies
• Hunting
• Feature extraction
• Behavior extraction
• Correlation
• Attribution
• Tracking