huntress logo

Huntress Resource Center

Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.

Glitch effectGlitch effectGlitch effect
24-7 SOC
24-7 SOC
Video

SOC Incident Walkthrough: How SIEM Helps Shut Down VPN Compromises

Video
Text Link
Security Awareness Training
Security Awareness Training
Video

Managed SAT Overview Video

Video
Text Link
Business Email Compromise
Business Email Compromise
Video

Breaking Down Business Email Compromise

Video
Text Link
Managed EDR
Managed EDR
Video

Huntress Managed EDR: Persistent Footholds

Video
Text Link
Security Awareness Training
Security Awareness Training
Video

Keep Your Human Risk Levels in Check

Video
Text Link
Security Awareness Training
Security Awareness Training
Video

Threat Simulator for Managed SAT

Video
Text Link
Managed EDR
Managed EDR
Video

Why Managed EDR?

Video
Text Link
Attacker Tradecraft
Attacker Tradecraft
Video

How Adversary in the Middle Attacks Happen

Video
Text Link
Ransomware
Ransomware
Video

How Ransomware Attacks Happen

Video
Text Link
Video

Rogue Apps 101

Video
Text Link
Video

Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Video
Text Link
Video

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Video
Text Link
Video

What is ITDR?

Video
Text Link
Mastering Cybersecurity
Mastering Cybersecurity
Video

ITDR Product Overview

Video
Text Link
Attacker Tradecraft
Attacker Tradecraft
Video

Lifecycle of an Incident - Evilginx

Video
Text Link

See Huntress in Action

Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.

Book a Demo