Sat Feb 01 2025
938 label.wordCount 路 6 label.readTime
Conti
An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.

Sat Feb 01 2025
976 label.wordCount 路 7 label.readTime
REvil Corp
You are involved in an incident response engagement and need to analyze an infected host using Redline

Tue Jan 28 2025
557 label.wordCount 路 4 label.readTime
Setup Wazuh Lab
Analyze Windows Security Event logs to investigate an attempted RDP brute-force attack.

Sun Sep 22 2024
5186 label.wordCount 路 30 label.readTime
Firewall Fundamentals
Explore and master the Linux iptables firewall and its utilities for managing network traffic and enhancing security on Linux systems.

Sun Sep 22 2024
1994 label.wordCount 路 13 label.readTime
Legal Considerations in DFIR
Understand the processes involved in DFIR and the legal considerations that guide them.

Sun Sep 22 2024
4498 label.wordCount 路 27 label.readTime
Networking Concepts
Learn about the ISO OSI model and the TCP/IP protocol suite.

Sun Sep 22 2024
2790 label.wordCount 路 16 label.readTime
SOC Fundamentals
Learn about the SOC team and their processes.
SOC label.noTag

Fri Sep 20 2024
980 label.wordCount 路 6 label.readTime
Day 1 - Introduction to Packet Tracer
Overview of Cisco Packet Tracer and setting up a basic DHCP example
