Hacking Articles shared tons of manuals and guides of Computer Forensic.
Microsoft Advanced Threat Analytics Team shared the book How to simulate and detect attacks with the Advanced Threat Analytics Playbook.
Microsoft released a PDF showing how to execute common attacks with PowerSploit, Mimikatz, etc and how ATA detects them.
Cyber attacks occur everywhere. Combating threats and maintain service availability even cyber attacks have become more secretive and resistant. Threat intelligence is becoming more common and important in recent years. In spite of this, many experts do not stop there, and try to understand how to apply this intelligence in their operations and organizations.