{"id":17752,"date":"2022-04-28T08:17:38","date_gmt":"2022-04-28T08:17:38","guid":{"rendered":"https:\/\/qubitacademy.com\/?post_type=product&#038;p=17752"},"modified":"2022-04-28T08:24:54","modified_gmt":"2022-04-28T08:24:54","slug":"targeted-threat-hunting","status":"publish","type":"product","link":"https:\/\/qubitacademy.com\/sk\/product\/targeted-threat-hunting\/","title":{"rendered":"Targeted Threat Hunting"},"content":{"rendered":"<div class=\"thrv_wrapper thrv_text_element\" data-css=\"tve-u-176704318da\">\n<div class=\"thrv_wrapper thrv_text_element\" data-css=\"tve-u-176704318da\">\n<h1 class=\"\" data-css=\"tve-u-17665de2404\">Targeted Threat Hunting<\/h1>\n<\/div>\n<div class=\"thrv_wrapper thrv_text_element\" data-css=\"tve-u-176666f3771\">\n<p>Incidents happen. The question when. And maybe even better question is not when it will happen, but what if it has already happened. The attack could be stealthy and undetected yet. However, we can assume that the attack is still ongoing. Now, with this mindset, lets focus on our possibilities. How we can detect the attack and verify our hypothesis? The answer is Threat Hunting.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Incidents happen. The question when. And maybe even better question is not when it will happen, but what if it has already happened. The attack could be stealthy and undetected yet. However, we can assume that the attack is still ongoing. Now, with this mindset, lets focus on our possibilities. How we can detect the attack and verify our hypothesis? The answer is Threat Hunting. <a href=\"https:\/\/qubitacademy.com\/targeted-threat-hunting\/\">More information&#8230;<\/a><\/p>\n","protected":false},"featured_media":17754,"template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Targeted Threat Hunting - Qubit Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted Threat Hunting - Qubit Academy\" \/>\n<meta property=\"og:description\" content=\"Incidents happen. The question when. And maybe even better question is not when it will happen, but what if it has already happened. The attack could be stealthy and undetected yet. However, we can assume that the attack is still ongoing. Now, with this mindset, lets focus on our possibilities. How we can detect the attack and verify our hypothesis? The answer is Threat Hunting. More information...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/\" \/>\n<meta property=\"og:site_name\" content=\"Qubit Academy\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-28T08:24:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/qubitacademy.com\/wp-content\/uploads\/2022\/04\/Targeted_Threat_Hunting_Training.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 min\u00fata\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/\",\"url\":\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/\",\"name\":\"Targeted Threat Hunting - Qubit Academy\",\"isPartOf\":{\"@id\":\"https:\/\/qubitacademy.com\/sk\/#website\"},\"datePublished\":\"2022-04-28T08:17:38+00:00\",\"dateModified\":\"2022-04-28T08:24:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/qubitacademy.com\/sk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/qubitacademy.com\/sk\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Targeted Threat Hunting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/qubitacademy.com\/sk\/#website\",\"url\":\"https:\/\/qubitacademy.com\/sk\/\",\"name\":\"Qubit Academy\",\"description\":\"Vzdel\u00e1vanie v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/qubitacademy.com\/sk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Targeted Threat Hunting - Qubit Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/","og_locale":"sk_SK","og_type":"article","og_title":"Targeted Threat Hunting - Qubit Academy","og_description":"Incidents happen. The question when. And maybe even better question is not when it will happen, but what if it has already happened. The attack could be stealthy and undetected yet. However, we can assume that the attack is still ongoing. Now, with this mindset, lets focus on our possibilities. How we can detect the attack and verify our hypothesis? The answer is Threat Hunting. More information...","og_url":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/","og_site_name":"Qubit Academy","article_modified_time":"2022-04-28T08:24:54+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/qubitacademy.com\/wp-content\/uploads\/2022\/04\/Targeted_Threat_Hunting_Training.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"1 min\u00fata"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/","url":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/","name":"Targeted Threat Hunting - Qubit Academy","isPartOf":{"@id":"https:\/\/qubitacademy.com\/sk\/#website"},"datePublished":"2022-04-28T08:17:38+00:00","dateModified":"2022-04-28T08:24:54+00:00","breadcrumb":{"@id":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/qubitacademy.com\/product\/targeted-threat-hunting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/qubitacademy.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/qubitacademy.com\/sk\/shop\/"},{"@type":"ListItem","position":3,"name":"Targeted Threat Hunting"}]},{"@type":"WebSite","@id":"https:\/\/qubitacademy.com\/sk\/#website","url":"https:\/\/qubitacademy.com\/sk\/","name":"Qubit Academy","description":"Vzdel\u00e1vanie v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/qubitacademy.com\/sk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/qubitacademy.com\/sk\/wp-json\/wp\/v2\/product\/17752"}],"collection":[{"href":"https:\/\/qubitacademy.com\/sk\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/qubitacademy.com\/sk\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qubitacademy.com\/sk\/wp-json\/wp\/v2\/media\/17754"}],"wp:attachment":[{"href":"https:\/\/qubitacademy.com\/sk\/wp-json\/wp\/v2\/media?parent=17752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}