Provide a solution for Adversary Tactics: Detection builds on standard network defense and incident response by focusing on abnormal behaviors and the use of adversary Tactics, Techniques, and Procedures (TTP); providing hands-on threat hunting course modeled around an enterprise network. Provide Of operator training on developing detections, alerting, and detection strategies on Sysmon, Windows Events Logs and Elasticsearch, Logstash, and Kilbana (ELK). Reference all attachments.