Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SOC Analyst Basics
Network Basics
Networks
OSI Model
OSI vs. TCP/IP
How the Internet works
TCP/UDP
Malware Analysis
Static Malware Analysis (14:03)
Dynamic Malware Analysis
Reverse Engineering
Detect and respond to Attacks
Security Information & Event Management
SIEM Agents
File Integrity Monitoring (FIM)
YARA Rules
Content Databases (CDB)
Active Response
behavior-based Detection
custom PowerShell Rules
Active Directory Setup
join Linux/Windows Clients to Domain
Detect Active Directory Attacks (Kerberoasting)
Windows Brute-Force Detection
Logs & SOC Tools/Methodologies
Linux Logs
Windows Logs
Intrusion Detection / Prevention Systems
MITRE ATT&CK
BONUS 🚀🚀🚀
BONUS - Digital Forensics (create Windows Snapshots)
BONUS - Disk Image Analysis
BONUS - Memory Forensics
custom PowerShell Rules
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock