Sat Feb 01 2025
938 label.wordCount 路 6 label.readTime

Conti

An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.

Conti
Sat Feb 01 2025
976 label.wordCount 路 7 label.readTime

REvil Corp

You are involved in an incident response engagement and need to analyze an infected host using Redline

REvil Corp
Tue Jan 28 2025
557 label.wordCount 路 4 label.readTime

Setup Wazuh Lab

Analyze Windows Security Event logs to investigate an attempted RDP brute-force attack.

Setup Wazuh Lab
Sun Sep 22 2024
5186 label.wordCount 路 30 label.readTime

Firewall Fundamentals

Explore and master the Linux iptables firewall and its utilities for managing network traffic and enhancing security on Linux systems.

Firewall Fundamentals
Sun Sep 22 2024
1994 label.wordCount 路 13 label.readTime

Legal Considerations in DFIR

Understand the processes involved in DFIR and the legal considerations that guide them.

Legal Considerations in DFIR
Sun Sep 22 2024
4498 label.wordCount 路 27 label.readTime

Networking Concepts

Learn about the ISO OSI model and the TCP/IP protocol suite.

Networking Concepts
Sun Sep 22 2024
2790 label.wordCount 路 16 label.readTime

SOC Fundamentals

Learn about the SOC team and their processes.

SOC label.noTag
SOC Fundamentals
Fri Sep 20 2024
980 label.wordCount 路 6 label.readTime

Day 1 - Introduction to Packet Tracer

Overview of Cisco Packet Tracer and setting up a basic DHCP example

Day 1 - Introduction to Packet Tracer